Home

Description

An issue was discovered in the PaperCut Hive Ricoh embedded application. When the "Deep Logging" (diagnostic) mode is enabled, the application inadvertently records administrative credentials in plain text within the log files. An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-05 | Updated 2026-05-05 | Assigner PaperCut




MEDIUM: 5.9CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-532 Insertion of sensitive information into log file

Product status

Default status
unaffected

Any version before 2.2.0
affected

Credits

Hayden Moore reporter

References

www.papercut.com/...apercut-hive-security-bulletin-may-2026/

cve.org (CVE-2026-7824)

nvd.nist.gov (CVE-2026-7824)

Download JSON