Notice of security investigation: "Vulnerability of SLP (Service Location Protocol) implementation that allows reflected DoS attacks via UDP" (CVE-2023-29552)
First published: 02:00 pm on October 02, 2023 (2023-10-02T12:00:00+09:00)
Ricoh Company, Ltd.
Ricoh understands the importance of security and is committed to managing its products and services with the most advanced security technologies possible for its customers worldwide.
Ricoh is aware of the reported "Vulnerability of SLP (Service Location Protocol) implementation that allows reflected DoS attacks via UDP" (CVE-2023-29552) affects certain products and services that Ricoh develops, manufactures, and offers.
Please refer to the following URL for vulnerability description.
https://nvd.nist.gov/vuln/detail/CVE-2023-29552
List 1 below shows the affected products and services. Ricoh offers measures detailed in the hyperlinked pages in the list.
| Vulnerability Information ID | ricoh-2023-000004 |
| Version | 1.00E |
| CVE ID(CWE ID) | CVE-2023-29552 ( N/A ) |
| CVSSv3 score | 7.5 HIGH |
List 1: Ricoh products and services affected by this vulnerability
| Product/service | Link to details |
| RICOH Streamline NX V3 | Affected. For details, please refer to the following URL. https://www.ricoh.com/products/security/vulnerabilities/adv?id=ricoh-prod000077-2023-000004 |
Contact
Please contact your local Ricoh representative or dealer if you have any queries.
History:
2023-10-02T12:00:00+09:00 : 1.00E Initial public release
News
Keep up to date
- 06Mar
Ricoh ranked 48th in Carbon Clean200™ 2026 list by Corporate Knights and As You Sow
- 26Feb
Ricoh named a Leader for the third time in Worldwide High-Speed Inkjet by IDC MarketScape
- 25Feb
Ricoh selected as a member of the Sustainability Yearbook 2026 by S&P Global
- 04Feb
Ricoh and Global Vision Multimedia Launch Strategic Partnership Negotiation in the Asia-Pacific region