JVN#78728294
Firmware update for RICOH JavaTM Platform resets the TLS configuration
Overview
When the firmware for JavaTM Platform provided by Ricoh Company, Ltd. is updated, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled".
Products Affected
- JavaTM Platform Ver.12.89 and earlier
- SP 5300DN/5310DN
- SP C340DN
- SP C342DN
- SP C840DN/C842DN
- SP C352DN
Description
JavaTM Platform provided by Ricoh Company, Ltd. is the execution environment for firmware extensions of Ricoh MFPs and printers, providing TLS (Transport Layer Security) communication mechanism.
When the firmware for JavaTM Platform is updated from Ver.12.89 or earlier versions to a newer version, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled" (CWE-1188).
Impact
The product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities.
Solution
Update the firmware and Verify the configuration
Update the JavaTM Platform's firmware to the latest version, and verify the TLS configuration.
Adjust the configuration if needed.
For more details, refer to the developer's information.
Vendor Status
Vendor | Link |
Ricoh Company, Ltd. | Specific Ricoh Printer Products - Java TM Platform vulnerability |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Comment
This analysis assumes a scenario in which an attacker uses RICOH Firmware Update Tool (JavaTM Platform) and enable TLS1.0 and TLS1.1.
Credit
Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-41995 |
JVN iPedia |
JVNDB-2024-000083 |