Skip to main content

Security advice

We do our best to make you aware of potential security risks. Here you will find an overview of all our security advice, which we update and supplement on a regular basis.

Impact of the CVE-2024-3094 vulnerability on our products

02.05.2024 / There is a security vulnerability (CVE-2024-3094) in XZ for Linux. You can find more information here.

Impact of the CVE-2024-22076 vulnerability on our products

29.02.2024 / There is a security vulnerability (CVE-2024-22076) in aQrate. You can find more information here.

Warning: Fake e-mails in circulation – fraudsters pretending to be TA Triumph-Adler employees

01/29/2024 / We are currently receiving sporadic reports of fraudsters pretending to be TA Triumph-Adler employees in e-mails. Here you can find more informations.

Impact of the CVE-2023-41835 vulnerability on our products

22.01.2024 / There is a potential security vulnerability (CVE-2023-41835) in Apache Struts. You can find more information here.

Impact of the vulnerability CVE-2023-50916 on our products

11.01.2024 / There is a security vulnerability (CVE-2023-50916) in the TA/UTAX Device Manager. You can find more information here.

Impact of the CVE-2023-4863 vulnerability on our products

November 30, 2023 / There is a security vulnerability (CVE-2023-4863) in libwebp. Find more information here.

Impact of the CVE-2023-31543 vulnerability on our products

November 30, 2023 / There is a security vulnerability (CVE-2023-31543) where pipreqs v0.3.0 to v0.4.11 is used. Find more information here.

Impact of the CVE-2023-4911 vulnerability on our products

22.11.2023 / There is a security vulnerability (CVE-2023-4911) in the dynamic loader ld.so of the C standard library GNU C Library. Find more information here.

Impact of the CVE-2023-25954 vulnerability on our products

27.09.2023 / CVE-2023-25954: A security vulnerability has been identified in TA Mobile Print for Android. TA Mobile Print's application class allows data transmission from malicious third-party mobile applications, which could result in malicious files being downloaded.

Impact of the CVE-2023-38408 vulnerability on our products

19.07.2023 / A vulnerability exists in the OpenSSH encryption suite and tool collection. Here you can find more information.

Impact of the vulnerability (CVE-2023-38634) in the KX driver on our products

24.05.2023 / There is a security vulnerability in the KX driver (CVE-2023-38634). You can find more information here.

Impact of the CVE-2023-36664 vulnerability on our products

11.07.2023 / A proof-of-concept exploit has been published for a critical vulnerability in the Ghostscript open source PDF library [KRO2023]. Here you can find more information.

Vulnerability in ScannerVision

19.07.2023 / A security vulnerability in one of the components used in the processing of PostScript files within the ScannerVision Server application was found. TA Triumph-Adler is aware of this vulnerability and takes this issue seriously. Here you can find more information.

Impact of vulnerabilities CVE-2021-43551 and CVE-2021-43552 on our products

06.01.2023 / Read more about the impact of vulnerabilities in the PI Vision (CVE-2021-43551) and Patient Information Center iX (CVE-2021-43552) on our products.

Service-Beitrag: Abschaffung Basis-Authentication Exchange Online

October 1, 2022 / Due to changes in Microsoft's advanced security policies, OAuth 2.0 authentication will be required to receive email with Microsoft Exchange Online from 1 October 2022. Learn more.

Impact of various vulnerabilities on our products

November 11th, 2022 / Find out how vulnerabilities JVN#46345126, CVE-2022-41798, CVE-2022-41807 and CVE-2022-41830 affect our products.

Impact of vulnerability CVE-2022-42889 on our products

November 3rd, 2022 / Here you can find the impact of the CVE-2022-42889 vulnerability on our products when using Apache Common Text Librabry.

Security vulnerability in our MFP

A security vulnerability has been identified in TA Triumph-Adler's multifunctional systems (MFPs). TA Triumph-Adler is aware of the vulnerability (CVE-2022-1026) and takes it very seriously. You can find more information here.

Impact of the Spring4Shell vulnerability on our products

Find here our security advice regarding the impact of the Spring4Shell vulnerability (CVE-2022-22950, CVE-2022-22963, CVE-2022-22965) on our products.

Impact of the Apache HTTP Server vulnerability on our products

Find here our security advice regarding the impact of the Apache HTTP Server (CVE-2021-44224, CVE-2021-44790) vulnerability on our products.

Impact of the Log4Shell vulnerability on our products

Find here our security advice regarding the impact of the Log4Shell vulnerability (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) on our products.

Impact of the HP Inc. MFP M725z vulnerability on our products

Find our security advisory regarding the impact of HP Inc. MFP M725z vulnerabilities CVE-2021-39237 and CVE-2021-39238 on our products.

Impact of CVE-2021-42013 Apache 2.4.49 and Apache 2.4.50 on our products

Please find here our security advices regarding the impact of the software version CVE-2021-42013 Apache 2.4.49 and Apache 2.4.50 on our products.

Impact of CVE-2021-22156 BlackBerry QNX-2021-001 on our products

Find our security advisory regarding the impact of CVE-2021-22156 BlackBerry QNX-2021-001 on our products here.

Administrator rights for the installation / configuration of printer drivers

Find here our safety instructions for the installation and configuration of printer drivers.