Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27108 | RICOH Streamline NX versions 3.5.1 to 24R3 are vulnerable to tampering with operation history. If an attacker can perform a man-in-the-middle attack, they may alter the values of HTTP requests, which could result in tampering with the operation history of the product’s management tool. |
Mon, 08 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 08 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ricoh
Ricoh streamline Nx |
|
| Vendors & Products |
Ricoh
Ricoh streamline Nx |
Mon, 08 Sep 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RICOH Streamline NX versions 3.5.1 to 24R3 are vulnerable to tampering with operation history. If an attacker can perform a man-in-the-middle attack, they may alter the values of HTTP requests, which could result in tampering with the operation history of the product’s management tool. | |
| Weaknesses | CWE-348 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-09-08T18:38:49.856Z
Reserved: 2025-09-03T06:29:41.944Z
Link: CVE-2025-58422
Updated: 2025-09-08T18:38:44.410Z
Status : Deferred
Published: 2025-09-08T05:15:34.450
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-58422
No data.
OpenCVE Enrichment
Updated: 2025-09-08T15:17:24Z
EUVD