
Updates will be provided as more information becomes available. The 'Succeeded to spool the print jobs.' message is displayed in the notification area. Please note that a closely related vulnerability (registered under CVE-2021-1675) has been patched by Microsoft recently ( link). The print rules configured on the Delegation Server are applied to the print job, and the job is stored in the data folder of RICOH Streamline NX PC Client. Again, we advise our customers to refer to the Microsoft advisory page. In the light of Microsoft releasing security updates as of July 6, we advise our customers to refer to the Microsoft advisory page.Ī further vulnerability related to the print spooler process (registered under CVE-2021-34481) has been confirmed by Microsoft. Please note that this option still requires the spooler service to be running when the printer is used. You can also bypass the spooling of your documents by selecting Print directly to the printer.

The security and integrity of our customer's data and devices is of the utmost importance to Ricoh. If you prefer other settings, you can easily change them to fit your needs.
#What is ricoh print spooling drivers
Ricoh print drivers are not directly affected by this vulnerability, however, because print drivers for Microsoft Windows operating systems make use of the printer spooler process, any potential mitigation might affect the ability to print or otherwise properly use print drivers. The vulnerability allows remote code execution by a standard Microsoft Active Domain user by exploiting vulnerabilities in the print spooler process used by all Microsoft operating systems. JRicoh is aware of the security vulnerability, commonly called "Print Nightmare," registered as CVE-2021-34527 and published by Microsoft ( link) on July 1, 2021.
