Home

Description

EPSON 1.124 contains an unquoted service path vulnerability in the SENADB service that allows local attackers to execute code with elevated system privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\EPSON_P2B\Printer Software\Status Monitor\ to inject malicious executables that will run with LocalSystem permissions.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-28 | Updated 2026-01-28 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

1.124
affected

Credits

İsmail Önder Kaya finder

References

www.exploit-db.com/exploits/48965 (ExploitDB-48965) exploit

www.epson.co.uk/support?productID=10820&os=22 (EPSON Official Support Page) product

www.vulncheck.com/.../epson-seksmdbexe-unquoted-service-path (VulnCheck Advisory: EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path) third-party-advisory

cve.org (CVE-2020-36984)

nvd.nist.gov (CVE-2020-36984)

Download JSON