search menu icon-carat-right cmu-wordmark

CERT Coordination Center

EPSON Network Utility installs EpsonBidirectionalService with insecure permissions

Vulnerability Note VU#672500

Original Release Date: 2015-10-27 | Last Revised: 2015-11-19

Overview

EPSON Network Utility contains a local privilege escalation vulnerability, which allows a local attacker to execute arbitrary code with SYSTEM privileges.

Description

CWE-276: Incorrect Default Permissions - CVE-2015-6034

EPSON Network Utility v4.10 is an application that checks the printer status and displays the printing progress over the network. During installation, the EPSON Network Utility creates EpsonBidirectionalService which runs as SYSTEM. The corresponding executable, eEBSVC.exe, has insecure permissions, allowing full access to the "Everyone" group in Windows. By replacing eEBSVC.exe with a malicious file of the same name, an attacker can execute arbitrary code with SYSTEM privileges.

Impact

A local, authenticated attacker can execute arbitrary code with SYSTEM privileges.

Solution

Apply an update

EPSON has released an update addressing CVE-2015-6034. Affected users are encouraged to update as soon as possible.

Vendor Information

672500
 
Affected   Unknown   Unaffected

SEIKO EPSON Corp. / Epson America Inc.

Notified:  August 14, 2015 Updated:  November 19, 2015

Statement Date:   September 16, 2015

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://www.epson.com/cgi-bin/Store/support/supAdvice.jsp?type=highlights&noteoid=288045 http://support.epson.net/ESN/info.html


CVSS Metrics

Group Score Vector
Base 6.6 AV:L/AC:M/Au:S/C:C/I:C/A:C
Temporal 5.5 E:F/RL:OF/RC:C
Environmental 4.1 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Will Hunt of 7Safe Ltd for reporting this vulnerability.

This document was written by Brian Gardiner.

Other Information

CVE IDs: CVE-2015-6034
Date Public: 2015-10-27
Date First Published: 2015-10-27
Date Last Updated: 2015-11-19 14:40 UTC
Document Revision: 41

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.