Published:2024/08/06  Last Updated:2024/08/06

JVN#78728294
Firmware update for RICOH JavaTM Platform resets the TLS configuration

Overview

When the firmware for JavaTM Platform provided by Ricoh Company, Ltd. is updated, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled".

Products Affected

  • JavaTM Platform Ver.12.89 and earlier
The following MFPs (multifunction printers) and printers are affected:
  • SP 5300DN/5310DN
  • SP C340DN
  • SP C342DN
  • SP C840DN/C842DN
  • SP C352DN

Description

JavaTM Platform provided by Ricoh Company, Ltd. is the execution environment for firmware extensions of Ricoh MFPs and printers, providing TLS (Transport Layer Security) communication mechanism.
When the firmware for JavaTM Platform is updated from Ver.12.89 or earlier versions to a newer version, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled" (CWE-1188).

Impact

The product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities.

Solution

Update the firmware and Verify the configuration
Update the JavaTM Platform's firmware to the latest version, and verify the TLS configuration.
Adjust the configuration if needed.

For more details, refer to the developer's information.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
Base Score: 2.4
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Comment

This analysis assumes a scenario in which an attacker uses RICOH Firmware Update Tool (JavaTM Platform) and enable TLS1.0 and TLS1.1.

Credit

Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-41995
JVN iPedia JVNDB-2024-000083