Description
EPSON 1.124 contains an unquoted service path vulnerability in the SENADB service that allows local attackers to execute code with elevated system privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\EPSON_P2B\Printer Software\Status Monitor\ to inject malicious executables that will run with LocalSystem permissions.
Problem types
Unquoted Search Path or Element
Product status
Credits
İsmail Önder Kaya
References
www.exploit-db.com/exploits/48965 (ExploitDB-48965)
www.epson.co.uk/support?productID=10820&os=22 (EPSON Official Support Page)
www.vulncheck.com/.../epson-seksmdbexe-unquoted-service-path (VulnCheck Advisory: EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path)