EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can leverage the unquoted path in 'C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE' to inject malicious executables and escalate privileges.
History

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Epson
Epson status Monitor 3
Vendors & Products Epson
Epson status Monitor 3

Tue, 27 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can leverage the unquoted path in 'C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE' to inject malicious executables and escalate privileges.
Title EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-01-27T18:51:02.299Z

Updated: 2026-01-29T16:49:10.392Z

Reserved: 2026-01-27T15:47:07.998Z

Link: CVE-2020-36975

cve-icon Vulnrichment

Updated: 2026-01-29T16:36:48.748Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-27T19:16:10.083

Modified: 2026-01-29T17:16:09.857

Link: CVE-2020-36975

cve-icon Redhat

No data.