ID

VAR-202302-1400


CVE

CVE-2022-43969


TITLE

Vulnerabilities in multiple Ricoh products

Trust: 0.8

sources: JVNDB: JVNDB-2022-019541

DESCRIPTION

Ricoh mp_c4504ex devices with firmware 1.06 mishandle credentials. RICOH MP C307 firmware, mp c407 firmware, mp c406 Unspecified vulnerabilities exist in multiple Ricoh products, including firmware.Information may be obtained and information may be tampered with

Trust: 1.71

sources: NVD: CVE-2022-43969 // JVNDB: JVNDB-2022-019541 // VULMON: CVE-2022-43969

AFFECTED PRODUCTS

vendor:ricohmodel:im 430fbscope:lteversion:1.10

Trust: 1.0

vendor:ricohmodel:im 2500scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:pro c5300sscope:lteversion:1.07

Trust: 1.0

vendor:ricohmodel:im c400fscope:lteversion:5.03

Trust: 1.0

vendor:ricohmodel:mp c4503scope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:im 3000scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:im 4000scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:im c300fscope:lteversion:5.03

Trust: 1.0

vendor:ricohmodel:mp c3004exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:mp c4504scope:lteversion:1.22

Trust: 1.0

vendor:ricohmodel:mp c2504exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:im c3500scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:mp c2504scope:lteversion:1.21

Trust: 1.0

vendor:ricohmodel:mp 2555scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:im c530fbscope:lteversion:6.17

Trust: 1.0

vendor:ricohmodel:mp c306scope:lteversion:1.20

Trust: 1.0

vendor:ricohmodel:mp c2003scope:lteversion:1.17

Trust: 1.0

vendor:ricohmodel:im 6000scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:im cw2200scope:lteversion:1.01

Trust: 1.0

vendor:ricohmodel:mp c2503 smart operation panelscope:lteversion:1.14

Trust: 1.0

vendor:ricohmodel:mp c307scope:lteversion:1.14

Trust: 1.0

vendor:ricohmodel:mp c2004scope:lteversion:1.21

Trust: 1.0

vendor:ricohmodel:mp 3055scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:mp c3004scope:lteversion:1.21

Trust: 1.0

vendor:ricohmodel:mp c3503 smart operation panelscope:lteversion:2.15

Trust: 1.0

vendor:ricohmodel:mp 6055scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:mp c6003scope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:mp 402spfscope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:im c5500scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:im 350fscope:lteversion:1.10

Trust: 1.0

vendor:ricohmodel:im c6000scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:im 8000scope:lteversion:2.02

Trust: 1.0

vendor:ricohmodel:mp 5055scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:mp c3003scope:lteversion:1.19

Trust: 1.0

vendor:ricohmodel:im c2000scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:im 5000scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:mp c407scope:lteversion:1.14

Trust: 1.0

vendor:ricohmodel:mp c6004exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:im c6500scope:lteversion:4.0

Trust: 1.0

vendor:ricohmodel:im c300scope:lteversion:5.03

Trust: 1.0

vendor:ricohmodel:mp c2004exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:mp c4504exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:mp c3504scope:lteversion:1.21

Trust: 1.0

vendor:ricohmodel:im cw2201scope:lteversion:1.11

Trust: 1.0

vendor:ricohmodel:im 550fscope:lteversion:5.02

Trust: 1.0

vendor:ricohmodel:im c3000scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:mp 3555scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:im 3500scope:lteversion:4.02

Trust: 1.0

vendor:ricohmodel:mp c5504exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:mp c3504exscope:lteversion:1.15

Trust: 1.0

vendor:ricohmodel:mp 305\+scope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:im 350scope:lteversion:1.10

Trust: 1.0

vendor:ricohmodel:im 9000scope:lteversion:2.02

Trust: 1.0

vendor:ricohmodel:im 2702scope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:im c400srfscope:lteversion:5.03

Trust: 1.0

vendor:ricohmodel:im c8000scope:lteversion:4.0

Trust: 1.0

vendor:ricohmodel:mp 4055scope:lteversion:1.18

Trust: 1.0

vendor:ricohmodel:mp c4503 smart operation panelscope:lteversion:2.17

Trust: 1.0

vendor:ricohmodel:mp c5503scope:lteversion:1.12

Trust: 1.0

vendor:ricohmodel:mp c3503scope:lteversion:1.19

Trust: 1.0

vendor:ricohmodel:mp c406scope:lteversion:1.20

Trust: 1.0

vendor:ricohmodel:im c530fscope:lteversion:6.17

Trust: 1.0

vendor:ricohmodel:im c2500scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:im 600srfscope:lteversion:5.02

Trust: 1.0

vendor:ricohmodel:im c4500scope:lteversion:6.03

Trust: 1.0

vendor:ricohmodel:mp c2003 smart operation panelscope:lteversion:1.14

Trust: 1.0

vendor:ricohmodel:mp c6003 smart operation panelscope:lteversion:2.17

Trust: 1.0

vendor:ricohmodel:mp c5504scope:lteversion:1.22

Trust: 1.0

vendor:ricohmodel:im 7000scope:lteversion:2.02

Trust: 1.0

vendor:ricohmodel:im 430fscope:lteversion:1.10

Trust: 1.0

vendor:ricohmodel:m c2001scope:lteversion:1.01

Trust: 1.0

vendor:ricohmodel:pro c5310sscope:lteversion:1.07

Trust: 1.0

vendor:ricohmodel:mp c3003 smart operation panelscope:lteversion:2.15

Trust: 1.0

vendor:ricohmodel:mp c6004scope:lteversion:1.22

Trust: 1.0

vendor:ricohmodel:im 600fscope:lteversion:5.02

Trust: 1.0

vendor:ricohmodel:mp c2503scope:lteversion:1.17

Trust: 1.0

vendor:ricohmodel:mp c5503 smart operation panelscope:lteversion:2.17

Trust: 1.0

vendor:リコーmodel:ricoh mp c307scope: - version: -

Trust: 0.8

vendor:リコーmodel:ricoh mp c6003scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c3503scope: - version: -

Trust: 0.8

vendor:リコーmodel:im cw2200scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c2503scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c406scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c2003scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c3003scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c5503scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c5503 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c306scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c407scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c4503 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c3003 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c6003 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c2003 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c2503 smart operation panelscope: - version: -

Trust: 0.8

vendor:リコーmodel:mp 402spfscope: - version: -

Trust: 0.8

vendor:リコーmodel:im cw2201scope: - version: -

Trust: 0.8

vendor:リコーmodel:mp c4503scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019541 // NVD: CVE-2022-43969

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-43969
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-43969
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-43969
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202302-1360
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-43969
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 2.0

NVD: CVE-2022-43969
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019541 // CNNVD: CNNVD-202302-1360 // NVD: CVE-2022-43969 // NVD: CVE-2022-43969

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-522

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019541 // NVD: CVE-2022-43969

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1360

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1360

PATCH

title:Ricoh MP C4504ex Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226781

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-43969

Trust: 0.1

sources: VULMON: CVE-2022-43969 // CNNVD: CNNVD-202302-1360

EXTERNAL IDS

db:NVDid:CVE-2022-43969

Trust: 3.3

db:JVNDBid:JVNDB-2022-019541

Trust: 0.8

db:CNNVDid:CNNVD-202302-1360

Trust: 0.6

db:VULMONid:CVE-2022-43969

Trust: 0.1

sources: VULMON: CVE-2022-43969 // JVNDB: JVNDB-2022-019541 // CNNVD: CNNVD-202302-1360 // NVD: CVE-2022-43969

REFERENCES

url:https://www.ricoh.com/software/dev_soft_manager

Trust: 2.5

url:https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2022-000002

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-43969

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-43969/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-43969

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-43969 // JVNDB: JVNDB-2022-019541 // CNNVD: CNNVD-202302-1360 // NVD: CVE-2022-43969

SOURCES

db:VULMONid:CVE-2022-43969
db:JVNDBid:JVNDB-2022-019541
db:CNNVDid:CNNVD-202302-1360
db:NVDid:CVE-2022-43969

LAST UPDATE DATE

2025-03-19T23:06:33.662000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-43969date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019541date:2023-10-26T03:53:00
db:CNNVDid:CNNVD-202302-1360date:2023-02-27T00:00:00
db:NVDid:CVE-2022-43969date:2025-03-19T15:15:41.137

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-43969date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019541date:2023-10-26T00:00:00
db:CNNVDid:CNNVD-202302-1360date:2023-02-16T00:00:00
db:NVDid:CVE-2022-43969date:2023-02-16T14:15:17.220