CVE-2026-21409: Authorization bypass through user-controlled key in Ricoh Company, Ltd. RICOH Streamline NX
Improper authorization vulnerability exists in RICOH Streamline NX 3.5.1 to 24R3. If a man-in-the-middle attack is conducted on the communication between the affected product and its user, and some crafted request is processed by the product, the user's registration information and/or OIDC (OpenID Connect) tokens may be retrieved.
AI Analysis
Technical Summary
CVE-2026-21409 is an authorization bypass vulnerability identified in Ricoh Streamline NX, a document workflow and management solution widely used in enterprise environments. The affected versions range from 3.5.1 to 24R3. The vulnerability arises due to improper authorization controls when processing user requests, specifically in scenarios where an attacker can intercept and manipulate communication between the client and the server (man-in-the-middle attack). By crafting specific requests during such an interception, the attacker can retrieve sensitive user registration information and OpenID Connect (OIDC) tokens. OIDC tokens are critical for authentication and authorization processes, and their compromise can lead to unauthorized access to user accounts or services. The vulnerability does not require the attacker to have prior authentication or user interaction, but the attacker must be able to intercept network traffic, which typically requires network-level access or control over communication channels. The CVSS v3.0 base score is 5.9, indicating a medium severity level, with the vector highlighting network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No public exploits have been reported yet, but the exposure of OIDC tokens poses a significant risk for identity and access management compromise. The vulnerability underscores the importance of securing communication channels and proper authorization checks within Ricoh Streamline NX products.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user registration data and authentication tokens, potentially enabling attackers to impersonate users or escalate privileges within document management workflows. This can result in data breaches, unauthorized document access, and compromise of identity management systems integrated via OIDC. Organizations handling sensitive or regulated data (e.g., financial, healthcare, government) face increased risk of compliance violations under GDPR and other data protection laws. The impact is heightened in environments where Ricoh Streamline NX is integrated with critical business processes or identity providers. Since exploitation requires network-level interception, organizations with less secure internal networks or remote access configurations are more vulnerable. The lack of impact on integrity and availability limits direct disruption but does not reduce the risk of downstream attacks leveraging stolen credentials or tokens.
Mitigation Recommendations
1. Immediately restrict network access to Ricoh Streamline NX servers, ensuring they are not exposed to untrusted networks or the internet. 2. Implement strong encryption protocols (e.g., TLS 1.2 or higher) for all communications between clients and the Ricoh Streamline NX server to prevent MITM attacks. 3. Employ network segmentation and monitoring to detect unusual traffic patterns indicative of interception or tampering. 4. Use endpoint security solutions to prevent attackers from gaining network access required for MITM. 5. Regularly audit and update identity provider configurations and OIDC token lifetimes to minimize token exposure risk. 6. Apply vendor patches or updates as soon as they become available to address the vulnerability directly. 7. Educate users and administrators on the risks of connecting through insecure networks and the importance of VPNs or secure channels. 8. Consider implementing additional multi-factor authentication (MFA) on critical systems to mitigate risks from token compromise. 9. Conduct penetration testing and vulnerability assessments focusing on network security around Ricoh Streamline NX deployments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2026-21409: Authorization bypass through user-controlled key in Ricoh Company, Ltd. RICOH Streamline NX
Description
Improper authorization vulnerability exists in RICOH Streamline NX 3.5.1 to 24R3. If a man-in-the-middle attack is conducted on the communication between the affected product and its user, and some crafted request is processed by the product, the user's registration information and/or OIDC (OpenID Connect) tokens may be retrieved.
AI-Powered Analysis
Technical Analysis
CVE-2026-21409 is an authorization bypass vulnerability identified in Ricoh Streamline NX, a document workflow and management solution widely used in enterprise environments. The affected versions range from 3.5.1 to 24R3. The vulnerability arises due to improper authorization controls when processing user requests, specifically in scenarios where an attacker can intercept and manipulate communication between the client and the server (man-in-the-middle attack). By crafting specific requests during such an interception, the attacker can retrieve sensitive user registration information and OpenID Connect (OIDC) tokens. OIDC tokens are critical for authentication and authorization processes, and their compromise can lead to unauthorized access to user accounts or services. The vulnerability does not require the attacker to have prior authentication or user interaction, but the attacker must be able to intercept network traffic, which typically requires network-level access or control over communication channels. The CVSS v3.0 base score is 5.9, indicating a medium severity level, with the vector highlighting network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No public exploits have been reported yet, but the exposure of OIDC tokens poses a significant risk for identity and access management compromise. The vulnerability underscores the importance of securing communication channels and proper authorization checks within Ricoh Streamline NX products.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user registration data and authentication tokens, potentially enabling attackers to impersonate users or escalate privileges within document management workflows. This can result in data breaches, unauthorized document access, and compromise of identity management systems integrated via OIDC. Organizations handling sensitive or regulated data (e.g., financial, healthcare, government) face increased risk of compliance violations under GDPR and other data protection laws. The impact is heightened in environments where Ricoh Streamline NX is integrated with critical business processes or identity providers. Since exploitation requires network-level interception, organizations with less secure internal networks or remote access configurations are more vulnerable. The lack of impact on integrity and availability limits direct disruption but does not reduce the risk of downstream attacks leveraging stolen credentials or tokens.
Mitigation Recommendations
1. Immediately restrict network access to Ricoh Streamline NX servers, ensuring they are not exposed to untrusted networks or the internet. 2. Implement strong encryption protocols (e.g., TLS 1.2 or higher) for all communications between clients and the Ricoh Streamline NX server to prevent MITM attacks. 3. Employ network segmentation and monitoring to detect unusual traffic patterns indicative of interception or tampering. 4. Use endpoint security solutions to prevent attackers from gaining network access required for MITM. 5. Regularly audit and update identity provider configurations and OIDC token lifetimes to minimize token exposure risk. 6. Apply vendor patches or updates as soon as they become available to address the vulnerability directly. 7. Educate users and administrators on the risks of connecting through insecure networks and the importance of VPNs or secure channels. 8. Consider implementing additional multi-factor authentication (MFA) on critical systems to mitigate risks from token compromise. 9. Conduct penetration testing and vulnerability assessments focusing on network security around Ricoh Streamline NX deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-12-24T07:24:57.904Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7d19
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/9/2026, 7:57:38 AM
Last updated: 1/9/2026, 11:09:46 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15501: OS Command Injection in Sangfor Operation and Maintenance Management System
CriticalCVE-2026-22584: CWE-94 Improper Control of Generation of Code ('Code Injection') in Salesforce Uni2TS
HighCVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle
LowCVE-2025-46299: Processing maliciously crafted web content may disclose internal states of the app in Apple tvOS
MediumCVE-2025-46298: Processing maliciously crafted web content may lead to an unexpected process crash in Apple tvOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.