CVE-2025-4960: CWE-863 Incorrect Authorization in EPSON EPSON Printer Controller Installer
CVE-2025-4960 is a local privilege escalation vulnerability in the EPSON Printer Controller Installer on macOS. The vulnerability arises from improper authorization checks in the com. epson. InstallNavi. helper tool, which fails to correctly authenticate clients over the XPC protocol and misuses macOS’s authorization model. This flaw allows any local user to request and obtain overly permissive rights from the authorization daemon, enabling execution of arbitrary commands or installation of system components without administrative credentials. The vulnerability has a high CVSS score of 7. 8, reflecting its significant impact on confidentiality, integrity, and availability. No user interaction is required, and exploitation requires only local access with low privileges. Although no known exploits are currently reported in the wild, the risk remains substantial due to the ease of exploitation and the potential for full system compromise.
AI Analysis
Technical Summary
CVE-2025-4960 is a local privilege escalation vulnerability affecting the EPSON Printer Controller Installer on macOS systems. The vulnerability is rooted in the com.epson.InstallNavi.helper tool, which is part of the EPSON printer driver installation package. This helper tool communicates over the XPC protocol but fails to properly authenticate clients, allowing any local user to interact with it. Furthermore, the tool incorrectly implements macOS’s authorization model by registering overly permissive custom rights in the system authorization database (/var/db/auth.db). These rights can be requested and granted by the authorization daemon to any local user, regardless of their privilege level. The tool invokes the AuthorizationCopyRights API but does so with these weakly defined rights, effectively bypassing intended security controls. As a result, an attacker with local access can exploit this vulnerability to execute arbitrary commands with elevated privileges or install system components without needing administrative credentials. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. While no public exploits are currently known, the flaw presents a significant risk for privilege escalation on affected macOS systems running EPSON printer drivers. Organizations should monitor for updates from EPSON and consider restricting local access or employing endpoint protection measures to mitigate risk until patches are available.
Potential Impact
The impact of CVE-2025-4960 on European organizations is considerable, especially for those using EPSON printers on macOS endpoints. Successful exploitation allows an attacker with local access to escalate privileges to root or administrative levels, enabling full system compromise. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of printing services, and potential lateral movement within corporate networks. Confidentiality is at high risk as attackers can access protected information; integrity is compromised through unauthorized system modifications; and availability may be affected if critical system components are altered or disabled. Given the prevalence of EPSON printers in office environments and the increasing adoption of macOS in European enterprises, this vulnerability could facilitate targeted attacks or insider threats. The lack of required user interaction and low complexity of exploitation increase the likelihood of successful attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks due to potential data breaches and regulatory non-compliance.
Mitigation Recommendations
To mitigate CVE-2025-4960, European organizations should take the following specific actions: 1) Immediately check for and apply any patches or updates released by EPSON addressing this vulnerability. 2) If patches are not yet available, restrict local user access on macOS systems that have EPSON printer drivers installed, limiting the number of users with local login privileges. 3) Employ endpoint detection and response (EDR) solutions to monitor for unusual process executions or privilege escalations related to the com.epson.InstallNavi.helper tool. 4) Audit and harden the macOS authorization database (/var/db/auth.db) to detect and remove overly permissive custom rights registered by the EPSON installer. 5) Consider temporarily uninstalling or disabling the EPSON Printer Controller Installer on critical systems where feasible until a patch is applied. 6) Educate IT staff and users about the risks of local privilege escalation and enforce strict access controls on shared or multi-user macOS devices. 7) Monitor system logs for suspicious XPC communications or unauthorized use of the AuthorizationCopyRights API. These targeted measures go beyond generic advice by focusing on the specific mechanisms exploited by this vulnerability and the affected components.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Belgium, Italy
CVE-2025-4960: CWE-863 Incorrect Authorization in EPSON EPSON Printer Controller Installer
Description
CVE-2025-4960 is a local privilege escalation vulnerability in the EPSON Printer Controller Installer on macOS. The vulnerability arises from improper authorization checks in the com. epson. InstallNavi. helper tool, which fails to correctly authenticate clients over the XPC protocol and misuses macOS’s authorization model. This flaw allows any local user to request and obtain overly permissive rights from the authorization daemon, enabling execution of arbitrary commands or installation of system components without administrative credentials. The vulnerability has a high CVSS score of 7. 8, reflecting its significant impact on confidentiality, integrity, and availability. No user interaction is required, and exploitation requires only local access with low privileges. Although no known exploits are currently reported in the wild, the risk remains substantial due to the ease of exploitation and the potential for full system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-4960 is a local privilege escalation vulnerability affecting the EPSON Printer Controller Installer on macOS systems. The vulnerability is rooted in the com.epson.InstallNavi.helper tool, which is part of the EPSON printer driver installation package. This helper tool communicates over the XPC protocol but fails to properly authenticate clients, allowing any local user to interact with it. Furthermore, the tool incorrectly implements macOS’s authorization model by registering overly permissive custom rights in the system authorization database (/var/db/auth.db). These rights can be requested and granted by the authorization daemon to any local user, regardless of their privilege level. The tool invokes the AuthorizationCopyRights API but does so with these weakly defined rights, effectively bypassing intended security controls. As a result, an attacker with local access can exploit this vulnerability to execute arbitrary commands with elevated privileges or install system components without needing administrative credentials. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. While no public exploits are currently known, the flaw presents a significant risk for privilege escalation on affected macOS systems running EPSON printer drivers. Organizations should monitor for updates from EPSON and consider restricting local access or employing endpoint protection measures to mitigate risk until patches are available.
Potential Impact
The impact of CVE-2025-4960 on European organizations is considerable, especially for those using EPSON printers on macOS endpoints. Successful exploitation allows an attacker with local access to escalate privileges to root or administrative levels, enabling full system compromise. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of printing services, and potential lateral movement within corporate networks. Confidentiality is at high risk as attackers can access protected information; integrity is compromised through unauthorized system modifications; and availability may be affected if critical system components are altered or disabled. Given the prevalence of EPSON printers in office environments and the increasing adoption of macOS in European enterprises, this vulnerability could facilitate targeted attacks or insider threats. The lack of required user interaction and low complexity of exploitation increase the likelihood of successful attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks due to potential data breaches and regulatory non-compliance.
Mitigation Recommendations
To mitigate CVE-2025-4960, European organizations should take the following specific actions: 1) Immediately check for and apply any patches or updates released by EPSON addressing this vulnerability. 2) If patches are not yet available, restrict local user access on macOS systems that have EPSON printer drivers installed, limiting the number of users with local login privileges. 3) Employ endpoint detection and response (EDR) solutions to monitor for unusual process executions or privilege escalations related to the com.epson.InstallNavi.helper tool. 4) Audit and harden the macOS authorization database (/var/db/auth.db) to detect and remove overly permissive custom rights registered by the EPSON installer. 5) Consider temporarily uninstalling or disabling the EPSON Printer Controller Installer on critical systems where feasible until a patch is applied. 6) Educate IT staff and users about the risks of local privilege escalation and enforce strict access controls on shared or multi-user macOS devices. 7) Monitor system logs for suspicious XPC communications or unauthorized use of the AuthorizationCopyRights API. These targeted measures go beyond generic advice by focusing on the specific mechanisms exploited by this vulnerability and the affected components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Pentraze
- Date Reserved
- 2025-05-19T17:26:58.497Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699674c56aea4a407a1029fd
Added to database: 2/19/2026, 2:26:13 AM
Last enriched: 2/19/2026, 2:40:33 AM
Last updated: 2/19/2026, 3:56:55 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2693: Improper Authorization in CoCoTeaNet CyreneAdmin
MediumCVE-2026-2692: Path Traversal in CoCoTeaNet CyreneAdmin
MediumCVE-2026-2691: SQL Injection in itsourcecode Event Management System
MediumCVE-2026-2690: SQL Injection in itsourcecode Event Management System
MediumCVE-2026-2689: SQL Injection in itsourcecode Event Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.