CVE-2025-42598

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code with SYSTEM privileges on Windows systems by placing a crafted DLL file in a specific location when SEIKO EPSON printer drivers are installed in non-English languages. It affects users of multiple EPSON printer drivers on Windows operating systems. Attackers need to convince users to place malicious files in specific directories.

💻 Affected Systems

Products:
  • Multiple SEIKO EPSON printer drivers for Windows
Versions: All versions prior to fixes released in April 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when drivers are installed or used in languages other than English. English language installations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise leading to complete host takeover, data exfiltration, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation to SYSTEM by convincing a user to place a malicious DLL, enabling persistence and further exploitation.

🟢

If Mitigated

Limited impact with proper user education, application whitelisting, and restricted file permissions preventing DLL placement.

🌐 Internet-Facing: LOW - Requires local access or convincing users to place files; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this through social engineering or existing access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to place DLL file. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated drivers released April 2025

Vendor Advisory: https://www.epson.co.uk/en_GB/faq/KA-01993/contents?loc=en-us

Restart Required: Yes

Instructions:

1. Visit EPSON support website. 2. Download latest printer driver for your model. 3. Uninstall current driver. 4. Install updated driver. 5. Restart system.

🔧 Temporary Workarounds

Switch to English language installation

windows

Reinstall printer drivers using English language settings to avoid vulnerable configuration

Restrict DLL loading permissions

windows

Set stricter permissions on printer driver directories to prevent unauthorized DLL placement

icacls "C:\Program Files\EPSON\" /deny Everyone:(OI)(CI)(W)

🧯 If You Can't Patch

  • Educate users not to place unknown DLL files in printer directories
  • Implement application whitelisting to prevent execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check if EPSON printer drivers are installed in non-English language and review driver version against April 2025 updates

Check Version:

Check printer properties in Windows Control Panel or EPSON software information

Verify Fix Applied:

Verify driver version is post-April 2025 and check language settings are English or updated

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL files in EPSON printer directories
  • Process creation from EPSON printer services with unusual parent processes

Network Indicators:

  • Unusual outbound connections from printer service processes

SIEM Query:

Process creation where parent process contains 'epson' and child process is suspicious executable

🔗 References

📤 Share & Export