Published:2026/02/20  Last Updated:2026/02/20

JVN#69531868
Installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール may insecurely load Dynamic Link Libraries

Overview

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール provided by Ricoh Company, Ltd. may insecurely load Dynamic Link Libraries.

Products Affected

  • ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7
This product is sold only in Japan and does not have an official English name.

Description

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール contains the following vulnerability related to the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.

  • Uncontrolled search path element (CWE-427)
    • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.4
    • CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2026-26050

Impact

Arbitrary code may be executed with administrative privileges.

Solution

Use the latest installer
Use the latest installer provided by the developer.

References

  1. Japan Vulnerability Notes JVNTA#91240916
    Insecure DLL Loading and Command Execution Issues on Many Windows Application Programs

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2026-26050
JVN iPedia JVNDB-2026-000028