Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.
9.8CVSS
9.2AI Score
0.002EPSS
7.5CVSS
8.2AI Score
0.001EPSS
6.8CVSS
6.8AI Score
0.001EPSS
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
7.5CVSS
7.4AI Score
0.001EPSS
8.8CVSS
8.7AI Score
0.001EPSS
7.5CVSS
7.9AI Score
0.001EPSS
Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.
7.5CVSS
7.3AI Score
0.002EPSS
Ricoh SP C250DN 1.05 devices allow denial of service (issue 2 of 3). Unauthenticated crafted packets to the IPP service will cause a vulnerable device to crash. A memory corruption has been identified in the way of how the embedded device parsed the IPP packets
9.8CVSS
9.3AI Score
0.002EPSS