CVE-2024-37124

9.8 CRITICAL

📋 TL;DR

CVE-2024-37124 is a critical vulnerability in Ricoh Streamline NX PC Client that allows arbitrary file creation through dangerous function usage. Attackers can exploit this to write malicious files to affected systems, potentially leading to code execution. All users of vulnerable Ricoh Streamline NX PC Client versions are affected.

💻 Affected Systems

Products:
  • Ricoh Streamline NX PC Client
Versions: All versions prior to 2.10.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the PC client software used with Ricoh multifunction printers/scanners.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary file creation leading to remote code execution, privilege escalation, or malware deployment.

🟠

Likely Case

Local file system manipulation allowing attackers to plant malicious files, potentially leading to persistence or lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced, though file system integrity may still be compromised.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to interact with the vulnerable component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.10.0.0 or later

Vendor Advisory: https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000006

Restart Required: Yes

Instructions:

1. Download Ricoh Streamline NX PC Client version 2.10.0.0 or later from Ricoh's official website. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Disable or Remove Vulnerable Software

windows

Uninstall Ricoh Streamline NX PC Client if not essential for operations.

Control Panel > Programs > Uninstall a program > Select Ricoh Streamline NX PC Client > Uninstall

Restrict Software Execution

windows

Use application control policies to prevent execution of vulnerable Ricoh software.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems with vulnerable software
  • Apply principle of least privilege to user accounts and restrict file system write permissions

🔍 How to Verify

Check if Vulnerable:

Check installed programs list for Ricoh Streamline NX PC Client version lower than 2.10.0.0

Check Version:

wmic product where "name like 'Ricoh Streamline NX PC Client%'" get version

Verify Fix Applied:

Verify Ricoh Streamline NX PC Client version is 2.10.0.0 or higher in installed programs

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events in Ricoh Streamline NX directories
  • Process creation events for Ricoh Streamline NX with suspicious parameters

Network Indicators:

  • Unexpected network connections from Ricoh Streamline NX processes

SIEM Query:

source="windows" AND process_name="*ricoh*" AND (event_id=4688 OR event_id=4663) AND target_object="*.exe" OR target_object="*.dll"

🔗 References

📤 Share & Export