Vulnerability Note VU#672500
EPSON Network Utility installs EpsonBidirectionalService with insecure permissions
Original Release date: 27 Oct 2015 | Last revised: 17 Nov 2015
EPSON Network Utility contains a local privilege escalation vulnerability, which allows a local attacker to execute arbitrary code with SYSTEM privileges.
CWE-276: Incorrect Default Permissions – CVE-2015-6034
EPSON Network Utility v4.10 is an application that checks the printer status and displays the printing progress over the network. During installation, the EPSON Network Utility creates EpsonBidirectionalService which runs as SYSTEM. The corresponding executable, eEBSVC.exe, has insecure permissions, allowing full access to the "Everyone" group in Windows. By replacing eEBSVC.exe with a malicious file of the same name, an attacker can execute arbitrary code with SYSTEM privileges.
A local, authenticated attacker can execute arbitrary code with SYSTEM privileges.
Apply an update
EPSON has released an update addressing CVE-2015-6034. Affected users are encouraged to update as soon as possible.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedEpson America, Inc.Affected14 Aug 201517 Nov 2015If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to Will Hunt of 7Safe Ltd for reporting this vulnerability.
This document was written by Brian Gardiner.
27 Oct 2015
Date First Published:
27 Oct 2015
Date Last Updated:
17 Nov 2015
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.