Vulnerability Note VU#672500
EPSON Network Utility installs EpsonBidirectionalService with insecure permissions
Original Release date: 27 Oct 2015 | Last revised: 17 Nov 2015

Overview
EPSON Network Utility contains a local privilege escalation vulnerability, which allows a local attacker to execute arbitrary code with SYSTEM privileges.

Description
CWE-276: Incorrect Default Permissions – CVE-2015-6034
EPSON Network Utility v4.10 is an application that checks the printer status and displays the printing progress over the network. During installation, the EPSON Network Utility creates EpsonBidirectionalService which runs as SYSTEM. The corresponding executable, eEBSVC.exe, has insecure permissions, allowing full access to the "Everyone" group in Windows. By replacing eEBSVC.exe with a malicious file of the same name, an attacker can execute arbitrary code with SYSTEM privileges.

Impact
A local, authenticated attacker can execute arbitrary code with SYSTEM privileges.

Solution
Apply an update

EPSON has released an update addressing CVE-2015-6034. Affected users are encouraged to update as soon as possible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedEpson America, Inc.Affected14 Aug 201517 Nov 2015If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
6.6
AV:L/AC:M/Au:S/C:C/I:C/A:C

Temporal
5.5
E:F/RL:OF/RC:C

Environmental
4.1
CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

https://www.epson.com/cgi-bin/Store/support/supAdvice.jsp?type=highlights&noteoid=288045
http://cwe.mitre.org/data/definitions/708

Credit

Thanks to Will Hunt of 7Safe Ltd for reporting this vulnerability.
This document was written by Brian Gardiner.

Other Information

CVE IDs:
CVE-2015-6034

Date Public:
27 Oct 2015

Date First Published:
27 Oct 2015

Date Last Updated:
17 Nov 2015

Document Revision:
41

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply