Vulnerability Details : CVE-2022-43969
Ricoh mp_c4504ex devices with firmware 1.06 mishandle credentials.
Products affected by CVE-2022-43969
- cpe:2.3:o:ricoh:mp_c4504ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c307_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_305\+_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c6003_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c407_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c406_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c306_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_cw2200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_cw2201_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_402spf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2003_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2503_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c4503_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c5503_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3003_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3503_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c4503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c5503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c6003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2004ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2504ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c5504ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c6004ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3004ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3504ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:pro_c5300s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:pro_c5310s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:m_c2001_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c530f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c530fb_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_350f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_350_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_430f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_430fb_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_550f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_600f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_600srf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_7000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_8000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_9000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_2555_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_3055_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_3555_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_4055_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_5055_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_6055_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_2500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_3000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_3500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_4000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_5000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_6000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_2702_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c400f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c300f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c400srf_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c2500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c6000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c5500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c3000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c3500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c4500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2504_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c2004_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c4504_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c5504_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c6004_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3504_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:mp_c3004_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c6500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:ricoh:im_c8000_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-43969
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-43969
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-19 |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2022-43969
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-43969
-
https://www.ricoh.com/software/dev_soft_manager
Device Software Manager | Global | RicohProduct
-
https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2022-000002
Information List by Vulnerability | Global | RicohVendor Advisory
Jump to