Published:2025/09/08  Last Updated:2025/09/08

JVN#75307484
RICOH Streamline NX vulnerable to tampering with operation history

Overview

RICOH Streamline NX provided by Ricoh Company, Ltd. contains a vulnerability that may lead to tampering with operation history

Products Affected

  • RICOH Streamline NX versions 3.5.1 to 24R3

Description

RICOH Streamline NX provided by Ricoh Company, Ltd. contains the following vulnerability.

  • Use of Less Trusted Source (CWE-348)
    • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 2.3
    • CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score 3.1
    • CVE-2025-58422

Impact

If an attacker can perform a man-in-the-middle attack, they may alter the values of HTTP requests, which could result in tampering with the operation history of the product’s management tool.

Solution

Update the Software
Update the software to the latest version according to the information provided by the developer.

Apply the workaround
The developer recommends the users to enable HTTPS and ensure all communications are encrypted.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Ricoh Company, Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-58422
JVN iPedia JVNDB-2025-000077