


Perceptive Security
SOC/SIEM Consultancy

EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiti…
Published:
26 January 2026 at 23:00:00
Alert date:
27 January 2026 at 21:03:58
Source:
nvd.nist.gov
Operating Systems
EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability (CVE-2020-36975) that allows local attackers to execute arbitrary code and escalate privileges. The vulnerability exists in the service binary path 'C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE' where attackers can inject malicious executables due to the unquoted path. This is a local privilege escalation vulnerability affecting EPSON printer software that could allow attackers with local access to gain elevated system privileges.
Technical details
Mitigation steps:
Affected products:
EPSON Status Monitor 3
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-36975
https://epson.com
https://www.exploit-db.com/exploits/49141
https://www.vulncheck.com/advisories/epson-status-monitor-epsonpmrpcv-unquoted-service-path
Related CVE's:
Related threat actors:
IOC's:
C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE
This article was created with the assistance of AI technology by Perceptive.
