{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2020-36975","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-01-27T15:47:07.998Z","datePublished":"2026-01-27T18:51:02.299Z","dateUpdated":"2026-04-07T14:05:11.814Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:05:11.814Z"},"title":"EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path","descriptions":[{"lang":"en","value":"EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can leverage the unquoted path in 'C:\\Program Files\\Common Files\\EPSON\\EPW!3SSRP\\E_S60RPB.EXE' to inject malicious executables and escalate privileges."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Unquoted Search Path or Element","cweId":"CWE-428","type":"CWE"}]}],"affected":[{"vendor":"SEIKO EPSON Corp","product":"Status Monitor 3","versions":[{"version":"EPSON_PM_RPCV4_06 8.0","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.5,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/49141","name":"ExploitDB-49141","tags":["exploit"]},{"url":"https://epson.com","name":"Official EPSON Corporate Homepage","tags":["product"]},{"name":"VulnCheck Advisory: EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/epson-status-monitor-epsonpmrpcv-unquoted-service-path"}],"credits":[{"lang":"en","value":"SamAlucard","type":"finder"}],"x_generator":{"engine":"vulncheck"},"datePublic":"2020-12-01T00:00:00.000Z"},"adp":[{"references":[{"url":"https://www.exploit-db.com/exploits/49141","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-29T15:49:31.683708Z","id":"CVE-2020-36975","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-29T16:49:10.392Z"}}]}}