The company recommends running the Epson Software Updater to download and install the “Security vulnerability patch” and the “Epson Printer Driver Security Support Tool”. “An attacker may execute arbitrary code with SYSTEM privilege on a Windows system on which the printer driver is installed,” stated the official vulnerability report. Security researchers discovered that the vulnerability enables DLL hijacking, a technique where attackers can replace legitimate Dynamic Link Library (DLL) files with malicious versions. This vulnerability specifically targets EPSON printer drivers installed on Windows operating systems when the software is configured in languages other than English. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability, tracked as CVE-2025-42598, was published by JPCERT/CC on April 28, 2025, and affects a wide range of printer driver installations when used in non-English language environments. However, once exploited, attackers gain full control over the affected system with the highest privileges, allowing them to access sensitive data, install malware, or establish persistence within the network. Users experiencing printer permission issues should consider uninstalling and reinstalling drivers after applying the security updates. The vulnerability affects numerous EPSON printer drivers. The technique allows attackers to execute code under the context of the user running the application, which becomes particularly dangerous when applications run with elevated privileges.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 28 Apr 2025 15:00:04 +0000