Skip to main content

CVE-2025-35970: Use of weak credentials in SEIKO EPSON Multiple EPSON product

High
VulnerabilityCVE-2025-35970cvecve-2025-35970
Published: Thu Aug 07 2025 (08/07/2025, 05:22:09 UTC)
Source: CVE Database V5
Vendor/Project: SEIKO EPSON
Product: Multiple EPSON product

Description

On multiple products of SEIKO EPSON and FUJIFILM Corporation, the initial administrator password is easy to guess from the information available via SNMP. If the administrator password is not changed from the initial one, a remote attacker with SNMP access can log in to the product with the administrator privilege.

AI-Powered Analysis

AILast updated: 08/07/2025, 06:02:47 UTC

Technical Analysis

CVE-2025-35970 is a high-severity vulnerability affecting multiple products from SEIKO EPSON and FUJIFILM Corporation. The core issue arises from the use of weak, easily guessable initial administrator passwords that can be derived from information accessible via the Simple Network Management Protocol (SNMP). SNMP is commonly used for network device management and monitoring, and if improperly secured, it can leak sensitive configuration details. In this case, an attacker with network access to SNMP on the affected devices can obtain information that reveals or allows guessing of the default administrator password. If the default password has not been changed, the attacker can remotely log in with full administrator privileges without any authentication barriers such as prior credentials or user interaction. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is primarily on confidentiality, as unauthorized access to administrator accounts can expose sensitive configuration and operational data, though integrity and availability impacts are not explicitly noted. The affected versions are not specifically enumerated here but are detailed by the vendor. No known exploits in the wild have been reported yet. This vulnerability highlights the critical risk posed by default credentials and SNMP exposure in networked devices, especially in environments where default passwords remain unchanged and SNMP is accessible from untrusted networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for enterprises, government agencies, and critical infrastructure operators using SEIKO EPSON or FUJIFILM networked devices. Unauthorized administrator access could lead to exposure of sensitive operational data, configuration manipulation, or pivoting within internal networks. Given the network-based attack vector and lack of required privileges or user interaction, attackers could exploit this vulnerability remotely and stealthily if SNMP access is not properly restricted. This could result in data breaches, disruption of device management, and potential lateral movement within corporate or governmental networks. The impact is heightened in sectors with strict data protection regulations such as GDPR, where unauthorized access to sensitive information can lead to regulatory penalties and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks against European organizations that rely on these devices for printing, scanning, or imaging services, potentially affecting business continuity and operational security.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit all SEIKO EPSON and FUJIFILM devices for default or weak administrator passwords. The initial administrator password must be changed to a strong, unique password that follows best practices for complexity and length. SNMP access should be tightly controlled: disable SNMP if not required, or restrict SNMP access to trusted management networks only using network segmentation and access control lists (ACLs). Employ SNMPv3 where possible, as it provides authentication and encryption, reducing the risk of information leakage. Regularly monitor network traffic for unauthorized SNMP queries and implement intrusion detection systems to alert on suspicious activities. Vendors should be contacted for any available patches or firmware updates addressing this issue, and these should be applied promptly. Additionally, organizations should implement network-level protections such as firewalls and VPNs to limit exposure of management interfaces. Finally, conduct regular security awareness and configuration audits to ensure default credentials are never used in production environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-07-17T05:11:00.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68943e03ad5a09ad00f73b08

Added to database: 8/7/2025, 5:47:47 AM

Last enriched: 8/7/2025, 6:02:47 AM

Last updated: 9/18/2025, 11:54:57 AM

Views: 55

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats