Published:2025/06/13  Last Updated:2025/06/13

JVN#27937557
Multiple vulnerabilities in RICOH Streamline NX PC Client

Overview

RICOH Streamline NX PC Client provided by Ricoh Company, Ltd. contains multiple vulnerabilities.

Products Affected

CVE-2025-36506, CVE-2025-46783

  • RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.242.0
CVE-2025-48825
  • RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.7.0

Description

RICOH Streamline NX PC Client provided by Ricoh Company, Ltd. contains multiple vulnerabilities listed below.

  • External control of file name or path (CWE-73)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Base Score 6.5
    • CVE-2025-36506
  • Path traversal (CWE-22)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-46783
  • Use of less trusted source (CWE-348)
    • CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 2.0
    • CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N Base Score 2.5
    • CVE-2025-48825

Impact

  • If an attacker sends a specially crafted request, arbitrary files in the file system can be overwritten with log data (CVE-2025-36506)
  • Arbitrary code may be executed on the PC where the product is running by tampering with specific files used on the product (CVE-2025-46783)
  • An attacker who can conduct a man-in-the-middle attack may eavesdrop upgrade requests and execute a malicious DLL with custom code (CVE-2025-48825)

Solution

Update the Software
Update the software to the latest version by using the appropriate installer for the fixed version according to the information provided by the developer.
For more information, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Ricoh Company, Ltd. reported these vulnerabilities to IPA to notify users of its solution through JVN.
JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-36506
CVE-2025-46783
CVE-2025-48825
JVN iPedia JVNDB-2025-000039