Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4960: CWE-863 Incorrect Authorization in EPSON EPSON Printer Controller Installer

0
High
VulnerabilityCVE-2025-4960cvecve-2025-4960cwe-863
Published: Thu Feb 19 2026 (02/19/2026, 01:37:22 UTC)
Source: CVE Database V5
Vendor/Project: EPSON
Product: EPSON Printer Controller Installer

Description

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOS’s authorization model, exposing privileged functionality to untrusted users. Although it invokes the AuthorizationCopyRights API, it does so using overly permissive custom rights that it registers in the system’s authorization database (/var/db/auth.db). These rights can be requested and granted by the authorization daemon to any local user, regardless of privilege level. As a result, an attacker can exploit the vulnerable service to perform privileged operations such as executing arbitrary commands or installing system components without requiring administrative credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:04:29 UTC

Technical Analysis

CVE-2025-4960 is a local privilege escalation vulnerability identified in the EPSON Printer Controller Installer, specifically within the com.epson.InstallNavi.helper tool deployed alongside EPSON printer drivers on macOS. The root cause is an incorrect authorization implementation (CWE-863) where the helper tool fails to properly authenticate clients communicating over the XPC protocol. It invokes the macOS AuthorizationCopyRights API but registers overly permissive custom rights in the system authorization database (/var/db/auth.db). These custom rights are granted by the authorization daemon to any local user without verifying privilege levels, effectively bypassing macOS's intended authorization model. As a result, an attacker with local access can exploit this flaw to perform privileged operations such as executing arbitrary commands or installing system components without needing administrative credentials or user interaction. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high severity with impacts on confidentiality, integrity, and availability. No patches or known exploits are currently reported, but the vulnerability's design flaw presents a significant risk to affected systems.

Potential Impact

The vulnerability allows any local user on a macOS system with the vulnerable EPSON printer driver installed to escalate their privileges to root or administrative levels. This can lead to complete system compromise, including unauthorized access to sensitive data, installation of persistent malware, and disruption of system operations. Organizations relying on EPSON printers in macOS environments face risks of insider threats or attackers gaining initial local access through other means and then leveraging this vulnerability to gain full control. The flaw undermines the security model of macOS by circumventing authorization checks, potentially leading to widespread exploitation if weaponized. Although exploitation requires local access, the ease of privilege escalation and lack of required user interaction increase the threat's severity. This can impact enterprise, government, and individual users, especially in environments where EPSON printers are common and macOS is widely used.

Mitigation Recommendations

1. EPSON should be engaged to provide an official patch or updated installer that correctly implements authorization checks and restricts custom rights appropriately. Until a patch is available, organizations should consider uninstalling or disabling the EPSON Printer Controller Installer on macOS systems where feasible. 2. Restrict local user access to macOS systems, enforcing strict access controls and monitoring for unauthorized local logins. 3. Use macOS security tools to audit and monitor the /var/db/auth.db authorization database for unauthorized changes or overly permissive rights registrations. 4. Employ endpoint detection and response (EDR) solutions to detect anomalous process executions or privilege escalation attempts related to the com.epson.InstallNavi.helper tool. 5. Implement application whitelisting to prevent unauthorized execution of the vulnerable helper tool or related components. 6. Educate users about the risks of local access and enforce least privilege principles to minimize the number of users with local login capabilities. 7. Monitor security advisories from EPSON and macOS vendors for updates and promptly apply patches once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Pentraze
Date Reserved
2025-05-19T17:26:58.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699674c56aea4a407a1029fd

Added to database: 2/19/2026, 2:26:13 AM

Last enriched: 2/28/2026, 1:04:29 PM

Last updated: 4/9/2026, 8:35:18 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses