Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN26835001/index.html | Third Party Advisory |
https://www.epson.jp/support/misc_t/201119_oshirase.htm | Vendor Advisory |
https://www.epson.jp/support/pdf/fy20-001_softwareList_20201106_b.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2020-11-24 07:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-5674
Mitre link : CVE-2020-5674
CVE.ORG link : CVE-2020-5674
JSON object : View
Products Affected
epson
- remote_printer_driver
- photostarter
- easy_photo_print
- colorbase
- print_layout
- photolier
- album_print
- status_monitor_2
- connect
- net_config_se
- scan_icm_updater
- universal_print_driver
- multi-print_quicker
- web_to_page
- prolab_print
- e-photo
- print_image_framer_tool
- imaging_workshop
- ec-01
- colorio_easy_print
- easy_settings
- color_calibration_utility
- net_software_development_kit
- net_print
- link2
- status_monitor_3
- ec-01_firmware
- photoquicker
- pm-t990_integrated_installer
- webconfig
- creativity_suite
- net_config
- scanner_driver
microsoft
- windows_me
- windows_98
- windows
CWE
CWE-427
Uncontrolled Search Path Element