#VU25569 Permissions, Privileges, and Access Controls in RICOH COMPANY, LTD. products


| Updated: 2021-06-17

Vulnerability identifier: #VU25569

Vulnerability risk: Low

CVSSv3.1: 7.6 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C]

CVE-ID: CVE-2019-19363

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
PCL6 Driver for Universal Print
Hardware solutions / Drivers
PS Driver for Universal Print
Hardware solutions / Drivers
PC FAX Generic Driver
Hardware solutions / Drivers
Generic PCL5 Driver
Hardware solutions / Drivers
RPCS Driver
Hardware solutions / Drivers
PostScript3 Driver
Hardware solutions / Drivers
PCL6 (PCL XL) Driver
Hardware solutions / Drivers
RPCS Raster Driver
Hardware solutions / Drivers

Vendor: RICOH COMPANY, LTD.

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper permissions check. A local user can who can login to the computer where the affected printer driver is installed can use a specially crafted printer driver and gain administrative privileges on the target system.

Mitigation

Vendor recommends to download the security program Ver.1.3.0.0.


Printer Driver Version Model Name
PCL6 Driver for Universal Print Version 4.0 or later
  • All models that use this driver.
PS Driver for Universal Print Version 4.0 or later
  • All models that use this driver.
PC FAX Generic Driver All versions
  • All models that use this driver.
Generic PCL5 Driver All versions
  • All models that use this driver.
RPCS Driver All versions
  • DD 3324/DD 3334/DD 3344C/SD375
  • DD 6650P/SD 710
PostScript3 DriverAndPCL6 (PCL XL) Driver All versions Color MFPs
  • DSc 930/935/1020/1025/1030/1045/1060/1120/1220/1225/ 1230/1245/1260 Series
  • GS 3020c/3021c/3025c/3030c/3045c/3160c Series,
  • IM C300/C400/C2000/C2500/C3000/C3500/C4500/C5500/ C6000 Series
  • M C2001
  • MP C305/C306/C307/C401/C406/C407/C501/C2003/C2004/ C2011/C2094/C2503/C2504/C2594/C3002/C3003/C3004/C3502/C3503/C3504/C4502/C4503/C4504/C5502/C5503/C5504/C6003/C6004/C6502/C6503/C8002/C8003 Series
Black and White MFPs
  • DSm 923/928/933/940/950/1525SP/1530SP/1533SP/2525SP/2530SP/2535SP/2540SP/2550SP/2560SP/2625SP/2630SP/2635SP/ 2640SP/ 2650SP/2660SP
  • IM 350/430/550/600/2702 Series
  • MP 301/305/401SPF/402SPF/501SPF/601SPF/2001SP/2352/2501SP/2553/2554/2555/2852/3053/3054/3055/3352/3353/3554/3555/4002/4054/4055/5002/5054/5055/6002/6054/6055/6503/7502/7503/9002/9003 Series
Printers
  • P 501/502/800/801/C600
  • SP 400DN/450DN/3600DN/3600SF/3610SF/4310N/4510DN/ 4510SF/4520DN/5200S/5210SF/5210SR/5300DN/5310DN/ 6430DN/8300DN/8400DN,
  • SP C320DN/C340DN/C342DN/C352DN/C360DNw/ C360SFNw/C360SNw/C361SFNw/C440DN/C730DN/C830DN/C831DN/C840DN/C842DN Series
WIDE FORMAT MFPs
  • MP CW2200SP/CW2201SP/W6700/W7100/W8140 Series
Production Printers
  • Pro C5100S/C5110S/C5200S/C5210S/ C7100/C7110/C7200/C7210 Series
  • Pro 8100/8110/8120/8200/8210/8220/8300/8310/8320 Series
  • TotalFlow Print Server R-62/R-62A/R-61A/R-61/R-60A/R-60
RPCS Raster Driver All versions GELJETs
  • GX E2600/E3300N/E3350N/E5550N/E7700N/2500/3000/3000S/3000SF/3050SFN/5050N/7000 Series
  • SG 2100N/3100SNW/3110SFNW/3120BSFNW/7100DN Series
Garment Printer
  • Ri 100

Vulnerable software versions

PCL6 Driver for Universal Print: 4.0

PS Driver for Universal Print: 4.0

PC FAX Generic Driver: All versions

Generic PCL5 Driver: All versions

RPCS Driver: All versions

PostScript3 Driver: All versions

PCL6 (PCL XL) Driver: All versions

RPCS Raster Driver: All versions


External links
http://www.ricoh.com/info/2020/0122_1/
http://jvn.jp/en/jp/JVN15697526/index.html
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/Security_Patch/Security_Patch.htm


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability