Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://www.epson.jp/support/misc_t/201119_oshirase.htm | vendor advisory |
https://www.epson.jp/support/pdf/fy20-001_softwareList_20201106_b.pdf | vendor advisory |
https://jvn.jp/en/jp/JVN26835001/index.html | third party advisory |