CVE-2025-35970

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to guess the initial administrator password on affected SEIKO EPSON and FUJIFILM products using information available via SNMP. If administrators haven't changed default credentials, attackers can gain administrative access. This affects multiple printer and imaging products from both manufacturers.

💻 Affected Systems

Products:
  • Multiple SEIKO EPSON printers and imaging devices
  • Multiple FUJIFILM printers and imaging devices
Versions: All versions with default administrator passwords
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when default administrator password remains unchanged and SNMP access is available.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise allowing configuration changes, data exfiltration, device takeover, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized administrative access to affected devices, enabling configuration manipulation, service disruption, and potential credential harvesting.

🟢

If Mitigated

Minimal impact if default passwords have been changed and SNMP access is properly restricted.

🌐 Internet-Facing: HIGH if devices are internet-facing with SNMP exposed and default credentials unchanged.
🏢 Internal Only: MEDIUM to HIGH depending on network segmentation and SNMP access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires SNMP access to the device and knowledge of the password derivation method from SNMP information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://global.fujifilm.com/en/news/hq/697e, https://www.epson.jp/support/misc_t/250807_oshirase.htm

Restart Required: No

Instructions:

1. Change the administrator password from the default. 2. Restrict SNMP access to trusted networks only. 3. Follow vendor security recommendations in advisories.

🔧 Temporary Workarounds

Change Default Administrator Password

all

Change the administrator password to a strong, unique password that is not guessable from SNMP information.

Restrict SNMP Access

all

Configure SNMP to only allow access from trusted management systems using ACLs or firewall rules.

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict access controls
  • Disable SNMP entirely if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check if device uses default administrator password and has SNMP enabled. Test password guessability using SNMP-derived information.

Check Version:

Check device firmware version via web interface or SNMP: snmpget -v2c -c public [device_ip] sysDescr.0

Verify Fix Applied:

Verify administrator password has been changed to a strong, unique value and SNMP access is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful administrative login
  • SNMP queries from unauthorized sources
  • Configuration changes from unexpected sources

Network Indicators:

  • SNMP traffic to affected devices from unexpected sources
  • Administrative protocol traffic following SNMP queries

SIEM Query:

source_ip=[device_ip] AND (event_type="login" OR event_type="config_change") AND user="admin"

🔗 References

📤 Share & Export