Cookie Policy

Ricoh uses data collection tools such as cookies to provide you with a better experience when using this site. You can learn how to change these settings and get more information about cookies here

UPDATE: Potential security vulnerabilities in some of Ricoh's printers and Multifunction Printers (MFPs)

First publish date August 23rd, 2019
Date of current status December 13th, 2019
Ricoh Company, Limited.

Ricoh understands the importance of security and is committed to managing its products and services with the most advanced security technologies possible for their customers around the world.

Following the information disclosed in August, Ricoh has provided new firmware updates to address the identified vulnerabilities.
Model NameNew Firmware VersionNote
SP C250SF
SP C252SF
Ver.1.15
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/spc250sf/spc250sf.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C250DN
SP C252DN
Ver.1.09
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/spc250dn/spc250dn.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
M C250FW
M C250FWB
Ver.1.02
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/mc250fwb/mc250fwb.htm
  • CVE-2019-14301
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14307
P C300W
P C301W
Ver.1.02
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/pc300w/pc300w.htm
  • CVE-2019-14301
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14307
SP 330SN
SP 330SFN
Ver.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp330sn/sp330sn.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 330DNVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp330dn/sp330dn.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 3710SFVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp3710sf/sp3710sf.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 3710DNVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp3710dn/sp3710dn.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C260DNwVer.1.12
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/spc260dnw/spc260dnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C260SFNwVer.1.15
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/spc260sfnw/spc260sfnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C261DNwVer.1.13
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/spc261dnw/spc261dnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C261SFNwV.1.17
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/spc261sfnw/spc261sfnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C262SFNwVer.1.17
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/spc262sfnw/spc262sfnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP C262DNwVer.1.13 
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/spc262dnw/spc262dnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
MP 2014/2014D/2014ADVer.1.10
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/mp2014/mp2014.htm?lang=en
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
M 2700/2701Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/m2700/m2700.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 221S/SP 220SNw/SP 221SNw/SP 221SF/SP 220SFNw/SP 221SFNw/ SP 277SNwX/SP 277SFNwXSP 221S: Ver.1.10
SP 220SNw/SP 221SNw/SP 277SNwX: Ver.1.11
SP 221SF: Ver.1.11
SP 220SFNw/SP 221SFNw/SP 277SFNwX: Ver.1.12
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp221s/sp221s.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 221/SP 220Nw/SP 221Nw/SP277NwXSP 221:Ver.1.02
SP 220Nw/SP 221Nw/SP277NwX:Ver.1.04
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp221/sp221.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308
SP 210SU/SP 210SU Q* (China)Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp210su_q/sp210su_q.htm?lang=cn
  • CVE-2019-14302

SP 210SU*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp210su/sp210su.htm
  • CVE-2019-14302

SP 210SF*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp210sf/sp210sf.htm
  • CVE-2019-14302

SP 210SF/210SF Q* (China)Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp210sf_q/sp210sf_q.htm?lang=en
  • CVE-2019-14302

SP 211SF*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp211sf/sp211sf.htm
  • CVE-2019-14302

SP 211SU*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp211su/sp211su.htm
  • CVE-2019-14302

SP 212SNw (China)Ver.1.07
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp212snw/sp212snw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 212SFNw/SP 212SFwVer.1.08
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp212sfw/sp212sfw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 212SFNw (China)Ver.1.08 
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp212sfnw/sp212sfnw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 212SUwVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp212suw/sp212suw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213SNwVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/rc3/model/sp213suw/sp213suw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213SNw (Taiwan)Ver.1.05
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp213snw_tc/sp213snw
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213SUwVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp213suw/sp213suw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213SFNw/SP 213SFwVer.1.07
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp213sfw/sp213sfw.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213SFNw (Taiwan)Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp213sfnw_tc/sp213sfnw
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 210*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp210/sp210.htm
  • CVE-2019-14302
SP 210/210 Q* (China)Ver.1.02 
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp210_q/sp210_q.htm?lang=cn
  • CVE-2019-14302

SP 210e* (China)Ver.1.02
http://support.ricoh.com/bb/html/dr_ut_e/rcn1/model/sp210_2/sp210_2.htm
  • CVE-2019-14302

SP 211*Ver.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp211/sp211.htm
  • CVE-2019-14302

SP 212NwVer.1.06
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp212w/sp212w.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213NwVer.1.06
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp213w/sp213w.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213Nw (Taiwan)Ver.1.04
http://support.ricoh.com/bb/html/dr_ut_e/apc/model/sp213nw_tc/sp213nw_tc.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 212wVer.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp212w/sp212w.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

SP 213wVer.1.06
http://support.ricoh.com/bb/html/dr_ut_e/re2/model/sp213w/sp213w.htm
  • CVE-2019-14300
  • CVE-2019-14301
  • CVE-2019-14302
  • CVE-2019-14304
  • CVE-2019-14305
  • CVE-2019-14306
  • CVE-2019-14307
  • CVE-2019-14308

* Note: The model isn't impacted by CVE-2019-14300, 14301, 14304, 14305, 14306, 14307, 14308 because of USB connection.

To minimize potential security risks, Ricoh asks that customers follow the below practices.

  1. When the device is connected to a network, make sure that the network is protected, for instance, by a firewall.
  2. Install the device in a secure network where users are restricted.
  3. To protect the device from fraudulent operation by malicious persons, make sure to set up and periodically change passwords for the administrator and supervisor. Complex passwords more than 8 characters are recommended.
  4. Install the device in an environment under appropriate physical security to prevent unauthorized access.
For further details on best practices for securely setting up your printer or MFP, please visit here.

Ricoh constantly evaluates their products, especially when new vulnerabilities are identified, and will continue to update this list should any models manufactured since January 2014 be affected.

|About Ricoh|

Ricoh is empowering digital workplaces using innovative technologies and services enabling individuals to work smarter. For more than 80 years, Ricoh has been driving innovation and is a leading provider of document management solutions, IT services, communication services, commercial and industrial printing, digital cameras, and industrial systems.

Headquartered in Tokyo, Ricoh Group operates in approximately 200 countries and regions. In the financial year ended March 2019, Ricoh Group had worldwide sales of 2,013 billion yen (approx. 18.1 billion USD).

For further information, please visit www.ricoh-europe.com


For further information, please contact: 
Ricoh Europe PLC
Jack Gibson
Tel: +44 (0) 203 033 3766
E-mail: media@ricoh-europe.com
Homepage: www.ricoh-europe.com
Join us on Facebook: www.facebook.com/ricoheurope
Follow us on Twitter: www.twitter.com/ricoheurope
Follow us on LinkedIn: http://linkedin.com/company/ricoh-europe
Visit the Ricoh media centre at: www.ricoh-europe.com/press