Vulnerability identifier: #VU25569
Vulnerability risk: Low
CVSSv3.1: 7.6 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Local
Exploit availability: Yes
Vulnerable software:
PCL6 Driver for Universal Print
Hardware solutions /
Drivers
PS Driver for Universal Print
Hardware solutions /
Drivers
PC FAX Generic Driver
Hardware solutions /
Drivers
Generic PCL5 Driver
Hardware solutions /
Drivers
RPCS Driver
Hardware solutions /
Drivers
PostScript3 Driver
Hardware solutions /
Drivers
PCL6 (PCL XL) Driver
Hardware solutions /
Drivers
RPCS Raster Driver
Hardware solutions /
Drivers
Vendor: RICOH COMPANY, LTD.
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper permissions check. A local user can who can login to the computer where the affected printer driver is installed can use a specially crafted printer driver and gain administrative privileges on the target system.
Mitigation
Vendor recommends to download the security program Ver.1.3.0.0.
Printer Driver | Version | Model Name |
---|---|---|
PCL6 Driver for Universal Print | Version 4.0 or later |
|
PS Driver for Universal Print | Version 4.0 or later |
|
PC FAX Generic Driver | All versions |
|
Generic PCL5 Driver | All versions |
|
RPCS Driver | All versions |
|
PostScript3 DriverAndPCL6 (PCL XL) Driver | All versions |
Color MFPs
|
RPCS Raster Driver | All versions |
GELJETs
|
Vulnerable software versions
PCL6 Driver for Universal Print: 4.0
PS Driver for Universal Print: 4.0
PC FAX Generic Driver: All versions
Generic PCL5 Driver: All versions
RPCS Driver: All versions
PostScript3 Driver: All versions
PCL6 (PCL XL) Driver: All versions
RPCS Raster Driver: All versions
External links
http://www.ricoh.com/info/2020/0122_1/
http://jvn.jp/en/jp/JVN15697526/index.html
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/Security_Patch/Security_Patch.htm
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.