First published: Thu Dec 24 2020(Updated: )
Untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Epson Epsonnet Setupmanager | <2.2.15 | |
Epson Offirio Synergyware Printdirector | <1.6.1.1\/1.6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-5681.
The severity of CVE-2020-5681 is critical with a severity value of 7.8.
The affected software versions are EpsonNet SetupManager versions up to 2.2.14 and Offirio SynergyWare PrintDirector versions up to 1.6.1.1/1.6.1.2.
CVE-2020-5681 allows an attacker to gain privileges by exploiting an untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager and Offirio SynergyWare PrintDirector.
Yes, apply the latest security updates provided by Epson to fix CVE-2020-5681.