更新:關於 Microsoft Windows Print Spooler 漏洞的通知 (只提供英文版)
首次發布:2021年7月7日
最後更新:2021年7月21日
Ricoh is aware of the security vulnerability, commonly called "Print Nightmare," registered as CVE-2021-34527 and published by Microsoft (link) on July 1, 2021.
The vulnerability allows remote code execution by a standard Microsoft Active Domain user by exploiting vulnerabilities in the print spooler process used by all Microsoft operating systems. Ricoh print drivers are not directly affected by this vulnerability, however, because print drivers for Microsoft Windows operating systems make use of the printer spooler process, any potential mitigation might affect the ability to print or otherwise properly use print drivers.
The security and integrity of our customer's data and devices is of the utmost importance to Ricoh. In the light of Microsoft releasing security updates as of July 6, we advise our customers to refer to the Microsoft advisory page.
A further vulnerability related to the print spooler process (registered under CVE-2021-34481) has been confirmed by Microsoft. Again, we advise our customers to refer to the Microsoft advisory page.
Please note that a closely related vulnerability (registered under CVE-2021-1675) has been patched by Microsoft recently (link).
Updates will be provided as more information becomes available.
新聞及活動
緊貼理光動態
新聞
-
30 一月
Ricoh selected as one of the 2023 Global 100 Most Sustainable Corporations (只提供英文版)
-
27 一月
數碼港培育計劃初創公司低程式碼開發供應商Five與理光香港簽署合作備忘錄
-
17 一月
Ricoh’s post-pandemic workplace (只提供英文版)
-
26 十二月
Notice of security investigation: Vulnerability (CVE-2022-43969) towards scanner or FAX-installed Ricoh products that may cause folder user password breach (只提供英文版)