Impact
An insecure DLL search path in the installer of the RICOH Journal Aggregation Tool allows an attacker to cause the system to load a malicious DLL. This flaw can lead to execution of arbitrary code with full administrative rights on the affected machine. The weakness is a classic DLL search path traversal (CWE-427).
Affected Systems
Manufactured by Ricoh Company, Ltd., the vulnerability affects the "ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール" installer in all releases before version 1.3.7. Upgrading to 1.3.7 or later removes the issue.
Risk and Exploitability
The CVSS score of 8.4 indicates high severity. The EPSS score of <1% suggests a low likelihood of exploit at present, and the vulnerability is not currently listed in the CISA KEV catalog. The most likely attack vector is a local installation scenario where an attacker can run the installer with elevated privileges, causing the vulnerable DLL search to load a crafted library. If successful, the attacker gains full control of the system.
OpenCVE Enrichment