CVE-2024-36480

9.8 CRITICAL

📋 TL;DR

CVE-2024-36480 is a critical vulnerability in Ricoh Streamline NX PC Client versions 3.7.2 and earlier that uses hard-coded credentials. If exploited, attackers can gain LocalSystem Account privileges on affected Windows PCs, enabling complete system compromise. Organizations using vulnerable versions of this Ricoh printing/scanning software are at risk.

💻 Affected Systems

Products:
  • Ricoh Streamline NX PC Client
Versions: 3.7.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems where the Ricoh Streamline NX PC Client is installed. The vulnerability exists in the client software itself, not the Ricoh devices.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges leading to complete data theft, ransomware deployment, persistent backdoor installation, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to credential harvesting, installation of malware, and unauthorized access to sensitive documents and system resources.

🟢

If Mitigated

Limited impact if proper network segmentation, endpoint protection, and least privilege principles are implemented, though local system access remains possible.

🌐 Internet-Facing: LOW - This requires local access or network access to the vulnerable client software, which typically isn't directly internet-exposed.
🏢 Internal Only: HIGH - Attackers with internal network access or who gain initial foothold can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the system running the vulnerable client. The hard-coded credentials would need to be discovered/reverse-engineered, but once known, exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.7.3 or later

Vendor Advisory: https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000005

Restart Required: Yes

Instructions:

1. Download Ricoh Streamline NX PC Client version 3.7.3 or later from Ricoh's official website. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Uninstall vulnerable client

windows

Remove the Ricoh Streamline NX PC Client if not essential for operations

Control Panel > Programs > Uninstall a program > Select 'Ricoh Streamline NX PC Client' > Uninstall

Network isolation

all

Restrict network access to systems running the vulnerable client using firewall rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems with vulnerable client
  • Apply principle of least privilege and monitor for unusual LocalSystem account activity

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'Ricoh Streamline NX PC Client' and verify version is 3.7.2 or earlier

Check Version:

wmic product where name='Ricoh Streamline NX PC Client' get version

Verify Fix Applied:

Verify installed version is 3.7.3 or later in Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Unusual LocalSystem account activity
  • Process creation with SYSTEM privileges from Ricoh client processes
  • Authentication attempts using hard-coded credentials

Network Indicators:

  • Unusual outbound connections from systems with Ricoh client
  • Lateral movement attempts from affected systems

SIEM Query:

EventID=4688 AND NewProcessName CONTAINS 'Ricoh' AND SubjectUserName='SYSTEM'

🔗 References

📤 Share & Export