CVE-2025-35970
📋 TL;DR
This vulnerability allows remote attackers to guess the initial administrator password on affected SEIKO EPSON and FUJIFILM products using information available via SNMP. If administrators haven't changed default credentials, attackers can gain administrative access. This affects multiple printer and imaging products from both manufacturers.
💻 Affected Systems
- Multiple SEIKO EPSON printers and imaging devices
- Multiple FUJIFILM printers and imaging devices
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full administrative compromise allowing configuration changes, data exfiltration, device takeover, and potential lateral movement within the network.
Likely Case
Unauthorized administrative access to affected devices, enabling configuration manipulation, service disruption, and potential credential harvesting.
If Mitigated
Minimal impact if default passwords have been changed and SNMP access is properly restricted.
🎯 Exploit Status
Exploitation requires SNMP access to the device and knowledge of the password derivation method from SNMP information.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://global.fujifilm.com/en/news/hq/697e, https://www.epson.jp/support/misc_t/250807_oshirase.htm
Restart Required: No
Instructions:
1. Change the administrator password from the default. 2. Restrict SNMP access to trusted networks only. 3. Follow vendor security recommendations in advisories.
🔧 Temporary Workarounds
Change Default Administrator Password
allChange the administrator password to a strong, unique password that is not guessable from SNMP information.
Restrict SNMP Access
allConfigure SNMP to only allow access from trusted management systems using ACLs or firewall rules.
🧯 If You Can't Patch
- Isolate affected devices in separate network segments with strict access controls
- Disable SNMP entirely if not required for operations
🔍 How to Verify
Check if Vulnerable:
Check if device uses default administrator password and has SNMP enabled. Test password guessability using SNMP-derived information.
Check Version:
Check device firmware version via web interface or SNMP: snmpget -v2c -c public [device_ip] sysDescr.0
Verify Fix Applied:
Verify administrator password has been changed to a strong, unique value and SNMP access is properly restricted.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful administrative login
- SNMP queries from unauthorized sources
- Configuration changes from unexpected sources
Network Indicators:
- SNMP traffic to affected devices from unexpected sources
- Administrative protocol traffic following SNMP queries
SIEM Query:
source_ip=[device_ip] AND (event_type="login" OR event_type="config_change") AND user="admin"