JVNDB-2026-000066
Vulnerability from jvndb - Published: 2026-04-30 17:02 - Updated:2026-04-30 17:02
Severity ?
Summary
Open redirect vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor
Details
Web Image Monitor provided by Ricoh Company, Ltd. is a web server that is included in and runs on laser printers and MFPs (multifunction printers).
Web Image Monitor contains the vulnerability listed below.
- Open redirect (CWE-601) - CVE-2026-41226
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000066.html",
"dc:date": "2026-04-30T17:02+09:00",
"dcterms:issued": "2026-04-30T17:02+09:00",
"dcterms:modified": "2026-04-30T17:02+09:00",
"description": "Web Image Monitor provided by Ricoh Company, Ltd. is a web server that is included in and runs on laser printers and MFPs (multifunction printers).\r\nWeb Image Monitor contains the vulnerability listed below.\u003ca href=\u0027https://cwe.mitre.org/data/definitions/601.html\u0027 target=\u0027_blank\u0027\u003e\u003c/a\u003e\u003cul\u003e\u003cli\u003eOpen redirect (CWE-601) - CVE-2026-41226\u003c/li\u003e\u003c/ul\u003eTony Kirkland of Sixgen Inc reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000066.html",
"sec:cpe": {
"#text": "cpe:/a:ricoh:web_image_monitor",
"@product": "Web Image Monitor",
"@vendor": "Ricoh Co., Ltd",
"@version": "2.2"
},
"sec:cvss": {
"@score": "4.7",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2026-000066",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN65118274/index.html",
"@id": "JVN#65118274",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-41226",
"@id": "CVE-2026-41226",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Open redirect vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor"
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…