search menu icon-carat-right cmu-wordmark

CERT Coordination Center

EPSON Network Utility installs EpsonBidirectionalService with insecure permissions

Vulnerability Note VU#672500

Original Release Date: 2015-10-27 | Last Revised: 2015-11-19


EPSON Network Utility contains a local privilege escalation vulnerability, which allows a local attacker to execute arbitrary code with SYSTEM privileges.


CWE-276: Incorrect Default Permissions - CVE-2015-6034

EPSON Network Utility v4.10 is an application that checks the printer status and displays the printing progress over the network. During installation, the EPSON Network Utility creates EpsonBidirectionalService which runs as SYSTEM. The corresponding executable, eEBSVC.exe, has insecure permissions, allowing full access to the "Everyone" group in Windows. By replacing eEBSVC.exe with a malicious file of the same name, an attacker can execute arbitrary code with SYSTEM privileges.


A local, authenticated attacker can execute arbitrary code with SYSTEM privileges.


Apply an update

EPSON has released an update addressing CVE-2015-6034. Affected users are encouraged to update as soon as possible.

Vendor Information


SEIKO EPSON Corp. / Epson America Inc. Affected

Notified:  August 14, 2015 Updated: November 19, 2015

Statement Date:   September 16, 2015



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base 6.6 AV:L/AC:M/Au:S/C:C/I:C/A:C
Temporal 5.5 E:F/RL:OF/RC:C
Environmental 4.1 CDP:N/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Will Hunt of 7Safe Ltd for reporting this vulnerability.

This document was written by Brian Gardiner.

Other Information

CVE IDs: CVE-2015-6034
Date Public: 2015-10-27
Date First Published: 2015-10-27
Date Last Updated: 2015-11-19 14:40 UTC
Document Revision: 41

Sponsored by CISA.