Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26050: Uncontrolled Search Path Element in Ricoh Company, Ltd. ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール

0
High
VulnerabilityCVE-2026-26050cvecve-2026-26050
Published: Fri Feb 20 2026 (02/20/2026, 08:13:31 UTC)
Source: CVE Database V5
Vendor/Project: Ricoh Company, Ltd.
Product: ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール

Description

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrative privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:53:42 UTC

Technical Analysis

CVE-2026-26050 is a vulnerability identified in the installer of Ricoh Company, Ltd.'s ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール, specifically in versions prior to 1.3.7. The flaw stems from an uncontrolled search path element during the Dynamic Link Library (DLL) loading process. When the installer runs, it searches for required DLLs in directories that may be insecure or user-controllable, allowing an attacker to place a malicious DLL that the installer will load inadvertently. This leads to arbitrary code execution with administrative privileges because the installer runs with elevated rights. The vulnerability requires local access and user interaction (e.g., running the installer), but no prior authentication is needed. The CVSS v3.0 score is 7.8, indicating high severity, with impacts on confidentiality, integrity, and availability. The vulnerability could enable attackers to fully compromise affected systems, install persistent malware, or disrupt operations. No public exploits have been reported yet, but the risk remains significant due to the nature of DLL hijacking and privilege escalation. The affected product is primarily used in Japan, but any organization globally using this software version is at risk. The vendor has released version 1.3.7 to address this issue, though no direct patch links are provided in the source data.

Potential Impact

The vulnerability allows attackers to execute arbitrary code with administrative privileges on affected systems, leading to complete system compromise. This can result in unauthorized access to sensitive data (confidentiality breach), alteration or destruction of data (integrity impact), and disruption or denial of service (availability impact). Since the installer runs with elevated privileges, exploitation can facilitate the installation of persistent malware, lateral movement within networks, and full control over the affected machines. Organizations relying on this software for log aggregation and analysis may face operational disruptions and data integrity issues. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users have administrative rights or where attackers can trick users into running compromised installers. The absence of known exploits in the wild reduces immediate threat but does not diminish the urgency for remediation given the high potential impact.

Mitigation Recommendations

1. Immediately upgrade the ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール to version 1.3.7 or later, which addresses the DLL search path vulnerability. 2. Restrict installer execution to trusted administrators and ensure installers are obtained from verified sources to prevent tampering. 3. Implement application whitelisting and code integrity policies to prevent unauthorized DLLs from loading during installation. 4. Use Windows security features such as Safe DLL Search Mode and set secure DLL search paths to reduce the risk of DLL hijacking. 5. Educate users and administrators about the risks of running installers from untrusted locations or sources. 6. Monitor systems for unusual DLL loading behavior and signs of privilege escalation attempts. 7. Employ endpoint detection and response (EDR) tools to detect and block suspicious activities related to DLL hijacking and code execution. 8. Limit administrative privileges on endpoints to reduce the impact of potential exploitation. 9. Regularly audit installed software versions and patch management processes to ensure timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-02-17T06:44:17.959Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69981b6d2c4d84f260ba1514

Added to database: 2/20/2026, 8:29:33 AM

Last enriched: 2/28/2026, 2:53:42 PM

Last updated: 4/5/2026, 9:20:17 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses