CVE-2025-46783

9.8 CRITICAL

📋 TL;DR

A path traversal vulnerability (CWE-22) in RICOH Streamline NX V3 PC Client allows attackers to tamper with specific files, potentially leading to arbitrary code execution on affected systems. This affects all users running vulnerable versions of the software on Windows PCs. The high CVSS score of 9.8 indicates critical severity with low attack complexity.

💻 Affected Systems

Products:
  • RICOH Streamline NX V3 PC Client
Versions: 3.5.0 to 3.242.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the vulnerable version range are affected. The vulnerability requires local access or network access to the PC client.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the PC, installing malware, stealing data, and using the system as a foothold for lateral movement.

🟠

Likely Case

Local privilege escalation leading to unauthorized access, file manipulation, and potential ransomware deployment on the affected workstation.

🟢

If Mitigated

Limited impact if proper network segmentation, endpoint protection, and least privilege principles are implemented, though the vulnerability remains exploitable.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tampering with specific files used by the product. While no public PoC exists, the vulnerability description suggests straightforward exploitation for attackers with access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.243.0 or later

Vendor Advisory: https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000005

Restart Required: Yes

Instructions:

1. Download the latest version from RICOH's official website. 2. Uninstall the current vulnerable version. 3. Install the patched version (3.243.0+). 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict File Access Permissions

windows

Apply strict file system permissions to limit write access to directories used by RICOH Streamline NX V3 PC Client.

icacls "C:\Program Files\RICOH\Streamline NX V3" /deny Everyone:(OI)(CI)(W)

Network Segmentation

all

Isolate systems running the vulnerable software from critical network segments to limit lateral movement potential.

🧯 If You Can't Patch

  • Uninstall RICOH Streamline NX V3 PC Client if not essential for operations.
  • Implement application whitelisting to prevent execution of unauthorized binaries on affected systems.

🔍 How to Verify

Check if Vulnerable:

Check the installed version via Control Panel > Programs and Features or by running the client and viewing the About section.

Check Version:

wmic product where name="RICOH Streamline NX V3 PC Client" get version

Verify Fix Applied:

Confirm the version is 3.243.0 or higher after patching and verify no unusual file modifications occur in RICOH application directories.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation/modification in RICOH application directories
  • Unexpected process execution from RICOH paths

Network Indicators:

  • Suspicious outbound connections from systems running the vulnerable software

SIEM Query:

source="windows_security" event_id=4688 process_name="*ricoh*" OR file_path="*RICOH*Streamline*"

🔗 References

📤 Share & Export