7.8
CVE-2020-5674
- EPSS 0.08%
- Published 24.11.2020 07:15:11
- Last modified 21.11.2024 05:34:27
- Source vultures@jpcert.or.jp
- Teams watchlist Login
- Open Login
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Data is provided by the National Vulnerability Database (NVD)
Epson ≫ Album Print Version- SwPlatformupdate_program
Epson ≫ Color Calibration Utility Version-
Epson ≫ Colorio Easy Print Version-
Epson ≫ Creativity Suite Version-
Epson ≫ Easy Photo Print Version- SwPlatform-
Epson ≫ Easy Photo Print Version- SwPlatformcamera_raw
Epson ≫ Easy Settings Version- SwPlatformoffice
Epson ≫ Imaging Workshop Version-
Epson ≫ Multi-print Quicker Version- SwPlatformwindows
Epson ≫ Net Config Version-
Epson ≫ Net Config Se Version-
Epson ≫ Net Software Development Kit Version-
Epson ≫ Photoquicker Version-
Epson ≫ Photostarter Version3.1
Epson ≫ Pm-t990 Integrated Installer Version- SwPlatformwindows
Epson ≫ Print Image Framer Tool Version-
Epson ≫ Print Layout Version- SwPlatformphotoshop
Epson ≫ Prolab Print Version-
Epson ≫ Prolab Print Version- SwPlatformcamera_raw
Epson ≫ Remote Printer Driver Version-
Epson ≫ Scan Icm Updater Version-
Epson ≫ Scanner Driver Version-
Epson ≫ Web To Page Version-
Epson ≫ Universal Print Driver Version-
Epson ≫ Status Monitor 2 Version-
Epson ≫ Status Monitor 3 Version-
Epson ≫ Ec-01 Firmware Version-
Epson ≫ Print Image Framer Tool Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.21 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.