CVE-2026-7824 PUBLISHED

PaperCut Hive (Ricoh): Plain text password in logs

Assigner: PaperCut
Reserved: 05.05.2026 Published: 05.05.2026 Updated: 05.05.2026

An issue was discovered in the PaperCut Hive Ricoh embedded application. When the "Deep Logging" (diagnostic) mode is enabled, the application inadvertently records administrative credentials in plain text within the log files.

An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.9

Product Status

Vendor PaperCut
Product PaperCut Hive
Versions Default: unaffected
  • affected from 0 to 2.2.0 (excl.)

Credits

  • Hayden Moore reporter

References

Problem Types

  • CWE-532 Insertion of sensitive information into log file CWE