CVE-2021-47898

7.8 HIGH

📋 TL;DR

Epson USB Display 1.6.0.0 contains an unquoted service path vulnerability in the EMP_UDSA service, which runs with LocalSystem privileges. Attackers can exploit this by placing malicious executables in intermediate directories to gain elevated system access. This affects systems running the vulnerable Epson USB Display software.

💻 Affected Systems

Products:
  • Epson USB Display
Versions: 1.6.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the EMP_UDSA service to be installed and running, which occurs with default installation of Epson USB Display 1.6.0.0.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges, allowing attackers to install malware, steal credentials, or establish persistence.

🟠

Likely Case

Local privilege escalation leading to administrative access on the compromised system.

🟢

If Mitigated

Limited impact if proper endpoint security controls prevent unauthorized file creation in system directories.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access.
🏢 Internal Only: HIGH - Attackers with initial access to the system can escalate privileges to gain full control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to create files in system directories. Public exploit code is available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://epson.com.mx/

Restart Required: No

Instructions:

No official patch available. Check Epson website for updated software versions. Consider uninstalling the software if not needed.

🔧 Temporary Workarounds

Modify Service Path

windows

Add quotes around the service executable path in Windows Registry

sc config EMP_UDSA binPath= "C:\Program Files\EPSON\USB Display\EMP_UDSA.exe"

Restrict Directory Permissions

windows

Remove write permissions for non-administrative users on affected directories

icacls "C:\Program Files\EPSON\USB Display" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Uninstall Epson USB Display software if not required
  • Implement strict endpoint security controls to prevent unauthorized file creation in system directories

🔍 How to Verify

Check if Vulnerable:

Check if EMP_UDSA service exists and has an unquoted path: sc qc EMP_UDSA | findstr BINARY_PATH_NAME

Check Version:

Check installed software version in Control Panel > Programs and Features

Verify Fix Applied:

Verify service path is quoted and directory permissions are restricted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file creation in Epson USB Display directories
  • Suspicious process execution from intermediate directories

Network Indicators:

  • None - local vulnerability

SIEM Query:

Process creation where parent process is services.exe and command line contains unquoted path to EMP_UDSA.exe

🔗 References

📤 Share & Export