Notice on Ripple20 Treck TCP/IP Stack Potential Vulnerabilities
31.07.2020

Update: Notice on Ripple20 Treck TCP/IP Stack Potential Vulnerabilities

First published July 8, 2020
Date of current status 
January 7,2021 
Ricoh Company, Ltd.

Ricoh is aware of the security vulnerabilities known as the “Ripple20” disclosed by the JSOF on June 16, 2020. These vulnerabilities could potentially allow a remote hacker to trigger an information leak if a specific TCP/IP stack version is used.

We have confirmed that Ricoh A3-sized multi-function printers, production printers, digital duplicators, Interactive White Boards, projectors, and Unified Communication Systems do not use IP stack modules from Treck Inc. and Kasago of Zuken Elmic, Inc. The affected printers and A4-sized multi-function printers are confirmed only as following:

Model NameCVEs

SP 230SFNw 

SP 230DNw

  • CVE-2019-12264
  • CVE-2020-11896
  • CVE-2020-11898
  • CVE-2020-11900
  • CVE-2020-11901

  • CVE-2020-11902
  • CVE-2020-11903
  • CVE-2020-11906
  • CVE-2020-11907
  • CVE-2020-11909

  • CVE-2020-11910
  • CVE-2020-11911
  • CVE-2020-11912
  • CVE-2020-11913
  • CVE-2020-11914

P 201W 

M 340W 

M 340FW (China model)

  • CVE-2019-12264
  • CVE-2020-11896
  • CVE-2020-11898
  • CVE-2020-11900 
  • CVE-2020-11901 

  • CVE-2020-11902
  • CVE-2020-11903
  • CVE-2020-11906
  • CVE-2020-11907
  • CVE-2020-11909

  • CVE-2020-11910
  • CVE-2020-11911
  • CVE-2020-11912
  • CVE-2020-11913
  • CVE-2020-11914
Aficio SP 1210N

  • CVE-2019-12264
  • CVE-2020-11896
  • CVE-2020-11898
  • CVE-2020-11900
  • CVE-2020-11901
  • CVE-2020-11902

  • CVE-2020-11903
  • CVE-2020-11906
  • CVE-2020-11907
  • CVE-2020-11908
  • CVE-2020-11909
  • CVE-2020-11910

  • CVE-2020-11911
  • CVE-2020-11912
  • CVE-2020-11913
  • CVE-2020-11914

Aficio GX e3300N 

Aficio GX e7700N

  • CVE-2019-12264
  • CVE-2020-11911

  • CVE-2020-11901
  • CVE-2020-11912

  • CVE-2020-11903

  • CVE-2020-11907

  • CVE-2020-11910

THE POTENTIAL VULNERABILITY SUMMARY

The affected printer has potential vulnerabilities which may cause a device stall, memory destruction, and network failure, but won't be exploited by a springboard attack or cause confidential information leakage. Please visit here.

This vulnerability will not affect devices connected to the customer's network if the network is properly configured against external attacks. Ricoh recommends always using best practices for network protection, including:

  1. When the device is connected to a network, ensure that the network is protected, for example, by a firewall.
  2. Install the device in a secure network where users restrictions are in place.

RESOLUTION

Please download the updated firmware as below. Ricoh will release further updated firmware on the driver site as it is available.

Model NameNew Firmware VersionSolved CVEs
Aficio GX e3300N

Ver.1.19 

https://support.ricoh.com/bb/html/dr_ut_e/re2/model/gxe330/gxe330.htm

  • CVE-2019-12264
  • CVE-2020-11901
  • CVE-2020-11903
  • CVE-2020-11907
  • CVE-2020-11910
  • CVE-2020-11911
  • CVE-2020-11912
Aficio GX e7700N

Ver.1.05*1

https://support.ricoh.com/bb/html/dr_ut_e/rc2/model/gxe770/gxe770.htm

SP 230SFNw
SP 230DNw

Ver.1.05*2

https://support.ricoh.com/bb_v1oi/pub_e/oi/0001075/0001075678/VM0CA861X/M0CA8622_en.pdf

  • CVE-2019-12264
  • CVE-2020-11896
  • CVE-2020-11898
  • CVE-2020-11900
  • CVE-2020-11901
  • CVE-2020-11902
  • CVE-2020-11903

  • CVE-2020-11906
  • CVE-2020-11907
  • CVE-2020-11909
  • CVE-2020-11910
  • CVE-2020-11911
  • CVE-2020-11912
  • CVE-2020-11913
M 340W
M 340FW
P 201W
(China Model)

Ver.1.01*2

https://support.ricoh.com/bb_v1oi/pub_e/oi/0001081/0001081286/VM0DA8706_01/M0DA8706_cn.pdf

Note: The above firmware update guide is applied for P 201W as well.

  • CVE-2019-12264
  • CVE-2020-11896
  • CVE-2020-11898
  • CVE-2020-11900
  • CVE-2020-11901
  • CVE-2020-11902
  • CVE-2020-11903
  • CVE-2020-11906

  • CVE-2020-11907
  • CVE-2020-11909
  • CVE-2020-11910
  • CVE-2020-11911
  • CVE-2020-11912
  • CVE-2020-11913
  • CVE-2020-11914
*1) updated December 3, 2020
*2) updated September 25, 2020

The security and integrity of our customers' data and devices remain of utmost importance to Ricoh and will publish additional advisories for any other affected models, when applicable.

For further details on best practices for securely setting up your printer or MFP, please visit here.

| About Ricoh |

Ricoh is empowering digital workplaces using innovative technologies and services that enable individuals to work smarter from anywhere.

With cultivated knowledge and organizational capabilities nurtured over its 85-year history, Ricoh is a leading provider of digital services, information management, and print and imaging solutions designed to support digital transformation and optimize business performance.

Headquartered in Tokyo, Ricoh Group has major operations throughout the world and its products and services now reach customers in approximately 200 countries and regions. In the financial year ended March 2022, Ricoh Group had worldwide sales of 1,758 billion yen (approx. 14.5 billion USD).

For further information, please visit www.ricoh-europe.com

© 2023 RICOH COMPANY, LTD. All rights reserved. All referenced product names are the trademarks of their respective companies.

For further information, please contact: 
Ricoh Europe PLC
Charlotte Fernandez
E-mail: media@ricoh-europe.com
Homepage: www.ricoh-europe.com
Join us on Facebook: www.facebook.com/ricoheurope
Follow us on Twitter: www.twitter.com/ricoheurope
Follow us on LinkedIn: http://linkedin.com/company/ricoh-europe

Visit the Ricoh media centre at: www.ricoh-europe.com/press