Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23767: Missing authentication for critical function in Seiko Epson Corporation ESC/POS

0
Critical
VulnerabilityCVE-2026-23767cvecve-2026-23767
Published: Thu Mar 05 2026 (03/05/2026, 05:34:40 UTC)
Source: CVE Database V5
Vendor/Project: Seiko Epson Corporation
Product: ESC/POS

Description

ESC/POS, a printer control language designed by Seiko Epson Corporation, lacks mechanisms for user authentication and command authorization, does not provide controls to restrict sources or destinations of network communication, and transmits commands without encryption or integrity protection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:38:19 UTC

Technical Analysis

ESC/POS is a widely used printer control language developed by Seiko Epson Corporation, designed to manage receipt printers and other point-of-sale devices. CVE-2026-23767 identifies a critical security flaw in ESC/POS implementations: the protocol inherently lacks any form of user authentication or command authorization. This means that any entity capable of sending commands to an ESC/POS-enabled printer can execute critical functions without restriction. Furthermore, ESC/POS does not enforce controls to limit the sources or destinations of network communications, allowing attackers to connect from unauthorized networks or devices. Commands are transmitted in plaintext without encryption or integrity checks, exposing them to interception, tampering, or replay attacks. The vulnerability affects all products implementing ESC/POS, making it a widespread issue across many printer models and manufacturers that use this protocol. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the vulnerability is remotely exploitable over the network without any authentication or user interaction, and can result in complete confidentiality, integrity, and availability compromise of the printer. Potential attack vectors include sending malicious print jobs, altering printer configurations, or disrupting printing services. While no exploits have been reported in the wild yet, the simplicity of exploitation and critical impact necessitate urgent attention from affected organizations and vendors.

Potential Impact

The impact of CVE-2026-23767 is severe for organizations worldwide that utilize ESC/POS-enabled printers, especially in retail, hospitality, and financial sectors where point-of-sale devices are critical. Attackers can remotely execute arbitrary commands on printers, potentially leading to unauthorized disclosure of sensitive printed information, manipulation or deletion of print jobs, and disruption of printing services causing operational downtime. This can result in financial losses, reputational damage, and compliance violations if sensitive customer or transaction data is exposed. Additionally, compromised printers could be leveraged as pivot points within internal networks to launch further attacks or reconnaissance. The lack of encryption and authentication increases the risk of man-in-the-middle attacks and command injection from remote adversaries. Given the ubiquity of ESC/POS in POS environments globally, the threat surface is extensive and affects both small businesses and large enterprises.

Mitigation Recommendations

Since ESC/POS lacks built-in authentication and encryption, organizations should implement compensating controls to mitigate this vulnerability. Network segmentation is critical: isolate ESC/POS-enabled printers on dedicated VLANs or subnets with strict access controls to limit communication only to trusted devices and management systems. Employ network-level authentication and encryption mechanisms such as VPNs or IPsec tunnels to protect printer communications from interception and unauthorized access. Disable or restrict network access to printers from untrusted or public networks. Where possible, update printer firmware or vendor software to versions that may include enhanced security features or alternative protocols supporting authentication and encryption. Monitor network traffic for anomalous or unauthorized printer commands and implement intrusion detection systems tailored to detect ESC/POS command anomalies. Establish strict physical security controls to prevent local tampering. Finally, engage with vendors to advocate for secure protocol enhancements and timely patch releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-01-16T02:20:20.477Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a91cb5d1a09e29cbe4c252

Added to database: 3/5/2026, 6:03:33 AM

Last enriched: 3/12/2026, 8:38:19 PM

Last updated: 4/19/2026, 10:53:11 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses