{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-37124","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-06-03T11:46:18.673Z","datePublished":"2024-06-19T06:40:52.358Z","dateUpdated":"2024-08-02T03:50:54.525Z"},"containers":{"cna":{"affected":[{"vendor":"RICOH COMPANY, LTD.","product":"Ricoh Streamline NX PC Client","versions":[{"version":"ver.3.2.1.19","status":"affected"},{"version":" ver.3.3.1.3","status":"affected"},{"version":" ver.3.3.2.201","status":"affected"},{"version":" ver.3.4.3.1","status":"affected"},{"version":" ver.3.5.1.201 (ver.3.5.1.200op1)","status":"affected"},{"version":" ver.3.6.100.53","status":"affected"},{"version":" and ver.3.6.2.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Use of potentially dangerous function issue exists in Ricoh Streamline NX PC Client. If this vulnerability is exploited, an attacker may create an arbitrary file in the PC where the product is installed."}],"problemTypes":[{"descriptions":[{"description":"Use of potentially dangerous function","lang":"en","type":"text"}]}],"references":[{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000006"},{"url":"https://jvn.jp/en/jp/JVN00442488/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-06-19T06:40:52.358Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"affected":[{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.2.1.19","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.3.1.3","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.3.2.201","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.4.3.1","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.5.1.201\\/ver.3.5.1.200op1\\/","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.6.100.53","status":"affected"}]},{"vendor":"ricoh","product":"streamline_nx_pc_client","cpes":["cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"ver.3.6.2.1","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-06-20T15:32:35.494081Z","id":"CVE-2024-37124","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-20T15:44:52.938Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:50:54.525Z"},"title":"CVE Program Container","references":[{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000006","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN00442488/","tags":["x_transferred"]}]}]}}