An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Papercut
Papercut papercut Hive |
|
| Vendors & Products |
Papercut
Papercut papercut Hive |
Tue, 05 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in the PaperCut Hive Ricoh embedded application. When the "Deep Logging" (diagnostic) mode is enabled, the application inadvertently records administrative credentials in plain text within the log files. An attacker with administrative access to the PaperCut Hive management portal could remotely enable deep logging and subsequently retrieve sensitive device passwords from the logs after an authorized user authenticates at the device. This exposure allows for the lateral movement or unauthorized configuration of the physical print hardware. | |
| Title | PaperCut Hive (Ricoh): Plain text password in logs | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: PaperCut
Published:
Updated: 2026-05-05T12:41:06.788Z
Reserved: 2026-05-05T02:41:39.279Z
Link: CVE-2026-7824
Updated: 2026-05-05T12:41:03.156Z
Status : Awaiting Analysis
Published: 2026-05-05T07:16:01.100
Modified: 2026-05-07T15:10:53.070
Link: CVE-2026-7824
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:21:53Z