Lucene search

K
vulnrichmentJpcertVULNRICHMENT:CVE-2024-37124
HistoryJun 19, 2024 - 6:40 a.m.

CVE-2024-37124

2024-06-1906:40:52
jpcert
github.com
1
ricoh streamline nx
arbitrary file creation
vulnerability

AI Score

9.6

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Use of potentially dangerous function issue exists in Ricoh Streamline NX PC Client. If this vulnerability is exploited, an attacker may create an arbitrary file in the PC where the product is installed.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.2.1.19"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.3.1.3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.3.2.201"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.4.3.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.5.1.201\\/ver.3.5.1.200op1\\/"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.6.100.53"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ricoh",
    "product": "streamline_nx_pc_client",
    "versions": [
      {
        "status": "affected",
        "version": "ver.3.6.2.1"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

9.6

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-37124