An issue was discovered in the PaperCut Hive Ricoh embedded application. When the "Deep Logging" (diagnostic) mode is enabled, the application inadvertently records administrative credentials in plain text within the log files.
An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in the PaperCut Hive Ricoh embedded application. When the "Deep Logging" (diagnostic) mode is enabled, the application inadvertently records administrative credentials in plain text within the log files. An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware. | |
| Title | PaperCut Hive (Ricoh): Plain text password in logs | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2026-05-05T12:41:06.788Z
Reserved: 2026-05-05T02:41:39.279Z
Link: CVE-2026-7824
Updated: 2026-05-05T12:41:03.156Z
Status : Received
Published: 2026-05-05T07:16:01.100
Modified: 2026-05-05T07:16:01.100
Link: CVE-2026-7824
No data.
OpenCVE Enrichment
Updated: 2026-05-05T08:30:20Z