Update: Notice on potential impact of Apache Log4j vulnerability towards Ricoh products and services
Last updated: February 17, 2022
First published: December 15, 2021
Ricoh understands the importance of security and is committed to managing its products and services with the most advanced security technologies possible for its customers worldwide.
Ricoh is aware of the reported Apache Log4j remote code execution vulnerability CVE-2021-44228. Apache Log4j is an open-source logging JAVA-based library offered by Apache Software Foundation.
Servers operating with Apache Log4j are potentially threatened, allowing a third party to remotely access the server and execute remote code by sending modified data to exploit this vulnerability.
Upon thorough investigations, Ricoh confirmed the following products and services that it develops, manufactures, and offers are not impacted by this vulnerability, as List 1. For affected products and services, including those affected by related vulnerabilities such as CVE-2021-45046, CVE-2021-45105, CVE-2021-4104, and CVE-2021-44832, Ricoh offers measures detailed below in List 2.
List 1: Ricoh products and services not affected by this vulnerability
|Black & White MFP
|Wide Format MFP
|Black & White Laser printers
|Color Laser Printers
|Printer based MFP
|Remote Communication Gates
|Remote Communication Gate A2
|Remote Communication Gate A
|Remote Communication Gate Type N/L/BN1/BM1
|Software & Solutions
|@Remote Connector NX
|Card Authentication Package Series
|Device Manager NX Accounting
|Device Manager NX Enterprise
|Device Manager NX Lite
|Device Manager NX Pro
|Enhanced Locked Print Series
|ESA TransFormer Server v4.x
|EZ Charger Suite Serverless
|EZ Charger Suite Server
|Printer Driver Packager NX
|RICOH Smart Integration (RSI) Platform and its applications
|RICOH Print Management Cloud
|RICOH Streamline NX V2
|RICOH Streamline NX V3
|Commercial & Industrial Printing
|Wide Format Printers
|Software & Apps
|RICOH InfoPrint® Font Collection
|RICOH InfoPrint® PPFA
|RICOH InfoPrint® WorkFlow
|RICOH Web Enablement Solutions Suite
List 2: Ricoh products and services affected by this vulnerability
The following products have been confirmed to be affected by this vulnerability.
|Continuous feed printers
|Fixed release can be provided for these products. Please contact your sales representative.
|Software & Apps
|RICOH InfoPrint Manager
|RICOH TotalFlow BatchBuilder
|RICOH TotalFlow Prep
|RICOH TotalFlow Production Manager
|Media Management Tool
Media Management Tool-E
|Updated program has been released for these products.
Please download the latest firmware from the regional driver download site.
For products and solutions from vendors other than Ricoh, we recommend customers confirm the latest information directly with relevant vendors.
Ricoh is committed to supporting customers across the globe, enabling them to operate Ricoh products equipped with the latest security settings. Please note that this page will be updated if there is a change in the status.
News & Events
Keep up to date
Ricoh selected as a member of the Sustainability Yearbook 2024 by S&P Global
Ricoh recognized with double ‘A’ score for climate action and water security leadership in CDP A List
Notice regarding the Conclusion of the Absorption-type Company Split Agreement related to the Business Partnership with Toshiba Tec and integration of MFP development and manufacturing
Notice on potential impact of a heap buffer overflow vulnerability in libwebp / libvpx towards Ricoh products and services