First published: Fri Jan 24 2020(Updated: )
An issue was discovered in Ricoh (including Savin and Lanier) Windows printer drivers prior to 2020 that allows attackers local privilege escalation. Affected drivers and versions are: PCL6 Driver for Universal Print - Version 4.0 or later PS Driver for Universal Print - Version 4.0 or later PC FAX Generic Driver - All versions Generic PCL5 Driver - All versions RPCS Driver - All versions PostScript3 Driver - All versions PCL6 (PCL XL) Driver - All versions RPCS Raster Driver - All version
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ricoh Generic Pcl5 Driver | ||
Ricoh PC Fax Generic Driver | ||
Ricoh PCL6 (PCL XL) Driver | ||
Ricoh Pcl6 Driver For Universal Print | >=4.0<4.26 | |
Ricoh Postscript3 Driver | ||
Ricoh PS Driver for Universal Print | >=4.0<4.26 | |
Ricoh RPCS Raster Driver | ||
Ricoh RPCS Driver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19363 is a vulnerability in Ricoh Windows printer drivers that allows attackers local privilege escalation.
The affected Ricoh printer drivers are: Ricoh Generic Pcl5 Driver, Ricoh Pc Fax Generic Driver, Ricoh Pcl6 (Pcl Xl) Driver, Ricoh Pcl6 Driver For Universal Print, Ricoh Postscript3 Driver, Ricoh Ps Driver For Universal Print, Ricoh Rpcs Driver, Ricoh Rpcs Raster Driver.
CVE-2019-19363 has a severity rating of 7.8 (High).
To fix CVE-2019-19363, users should update their Ricoh printer drivers to version 4.26 or later of the PCL6 Driver for Universal Print or PS Driver for Universal Print.
You can find more information about CVE-2019-19363 on the following websites: [http://jvn.jp/en/jp/JVN15697526/index.html](http://jvn.jp/en/jp/JVN15697526/index.html), [http://packetstormsecurity.com/files/156082/Ricoh-Printer-Driver-Local-Privilege-Escalation.html](http://packetstormsecurity.com/files/156082/Ricoh-Printer-Driver-Local-Privilege-Escalation.html), [http://packetstormsecurity.com/files/156251/Ricoh-Driver-Privilege-Escalation.html](http://packetstormsecurity.com/files/156251/Ricoh-Driver-Privilege-Escalation.html).