Local privilege escalation in Windows OS through installed Epson printers installed in non-English - Frequently Asked Questions
Vulnerability Reference: CVE-2025-42598
Description:
If a user performs either of the following actions:
- Installs an Epson Windows Printer Driver in non-English OS environments
- Changes the language to one other than English
It is possible to overwrite some DLL files managed by the printer driver with all account privileges.
Impact:
A third party may be able to execute arbitrary code to allow higher privilege access and escalation capabilities. There are currently no reports of attacks exploiting this vulnerability.
Solution:
To ensure the security of your Epson product, please run the Epson Software Updater or download and install the security vulnerability patch.
As a general rule, to help secure all devices, end-users and their administrators should always implement and maintain industry-standard security controls and practices in setting up and managing their networks.
For more information on securing your Epson product, visit our Security Guidebook.
The Software Patch Supports the Following Operating Systems:
- Windows® XP / XP Professional x64 Edition
- Windows® Vista / Vista x64 Edition
- Windows® 7 / 7 x64
- Windows® 8 / 8 x64
- Windows® 8.1 / 8.1 x64
- Windows® 10 / 10 x64
- Windows® 11 x64
- Windows® Server 2003
- Windows® Server 2008 / 2008 R2
- Windows® Server 2012 / 2012 R2
- Windows® Server 2016
- Windows® Server 2019
- Windows® Server 2022
- Windows® Server 2025
For Those Not Yet Using Epson Software Updater:
- Download Epson Software Updater from the local Epson support page.
- Download the patch software via Epson Software Updater and then run it.
For Users Already Using Epson Software Updater:
Run the Epson Software Updater and install the Epson Printer Driver Security Support Tool.
Epson Printer Driver Security Support Tool:
For devices where Software Updater is not available, please download and install the Epson Printer Driver Security Support Tool.
Credit
We would like to thank private security researcher Erkan Ekici for his extensive work in identifying and sharing this security issue with us.