Published:2025/08/07  Last Updated:2025/08/07

JVNVU#91363496
Multiple SEIKO EPSON products use weak initial passwords

Overview

Multiple SEIKO EPSON products use weak initial passwords.

Products Affected

A wide range of products are affected.
As for the details of affected product names and model numbers, refer to the information provided by the respective vendors in [Vendor Status].

Description

Multiple SEIKO EPSON products contain the following vulnerability.

  • Use of weak credentials (CWE-1391)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 8.7
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 7.5
    • CVE-2025-35970
    • The initial administrator password is easy to guess from the information available via SNMP

Impact

If the administrator password is not changed from the initial one, a remote attacker with SNMP access can log in to the product with the administrator privilege.

Solution

Apply the Workaround
Applying the following workarounds to mitigate the impact of this vulnerability.

  • Change the administrator password, and manage it appropriately
  • Connect the product to a firewall-protected network
  • Connect the product to a network with a private IP address
For the details of workarounds, refer to the information provided by the respective vendors in [Vendor Status].

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

SEIKO EPSON CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-35970
JVN iPedia