top of page
perceptive_background_267k.jpg

EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiti…

Published:

26 januari 2026 om 23:00:00

Alert date:

27 januari 2026 om 21:03:58

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability (CVE-2020-36975) that allows local attackers to execute arbitrary code and escalate privileges. The vulnerability exists in the service binary path 'C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE' where attackers can inject malicious executables due to the unquoted path. This is a local privilege escalation vulnerability affecting EPSON printer software that could allow attackers with local access to gain elevated system privileges.

Technical details

Mitigation steps:

Affected products:

EPSON Status Monitor 3

Related links:

Related CVE's:

Related threat actors:

IOC's:

C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page