CVE-2018-0689

CVE information

Published

3 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

High

Impact Analysis

Description

HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user's web browser..

CVSSv2.0 Score

Severity
Medium
Base Score
6.8/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

CVSSv3.1 Score

Severity
High
Base Score
8.8/10
Exploit Score
2.8/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
5.9/10
Confidentiality Impact
High
Availability Impact
High
Integrity Impact
High
Scope
Unchanged
User Interaction
Required

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-03-13
cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-03-13
cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-09-04
cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-19
cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-07
cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-12
cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-07
cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-07
cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-07
cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-12
cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-12
cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-12
cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-01
cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-08-07
cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-12
cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-09-06
cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-02
cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-04-19
cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-09-06
cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-04-20
cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-07-18
cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-09-14
cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-07-04
cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-09-11
cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-07-24
cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-02-23
cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-20
cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-20
cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-10-17
cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-10-17
cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-29
cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-10-13
cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-10-13
cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-07
cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-04-27
cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-29
cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-06-27
cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-16
cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-12-08
cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-10-25
cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-03-09
cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-03-09
cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-02-23
cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-20
cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-02-21
cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*
  Yes
- 2018-02-21
cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-07
cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-04-27
cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-12-03
cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-11-16
cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-12-08
cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*
  Yes
- 2017-12-07
cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*
  No
-

Get started for free to scan for vulnerabilites.

Download Mageni. It is free to get started and can be installed in Windows, macOS and Linux.

How Mageni can help you?

How Mageni can help you?

Mageni can help you to know and remediate your vulnerabilities reducing your risk exposure and minimizing the likelihood of a data breach while decreasing your spending.

60% of breach victims were breached due to an unpatched known vulnerability1

62% were unaware that they were vulnerable prior to the data breach1

$4.24 million cost per data breach on average; highest in 17-year report history2

Citations 1. Costs and Consequences of Gaps in Vulnerability Response, Ponemom Institute 2. Cost of a Data Breach Report 2021, IBM

Mageni makes easy to find, prioritize, and remediate the vulnerabilities

Supported by industry-leading vulnerability intelligence and CompTIA PenTest+ professionals, Mageni puts security expertise in your hands.

Internal and External Scans

Scan your internal and public assets for vulnerabilities.

Remediate

Get the recommendations to mitigate the risks and vulnerabilities.

Secure your Applications

Scan third-party applications like Java, Chrome, Adobe and more.

Comprehensive Coverage

Scan servers, workstations and network devices for vulnerabilities.

Report and Analyze

Receive a report of the vulnerabilities that affect your assets.

More visibility

Perform non-credentialed or credentialed scans.

Prioritize

Prioritize the vulnerabilities based on CVSS, severity and other variables.

SSL Certificates

Improve the security of your secure layer and certificates.

Simple and transparent pricing

Get started for free with 7 days trial plus Money-Back Guarantee for 7 days after the end of the trial

Stop worrying about your budget or licenses limits

Mageni provides unlimited vulnerability scans for unlimited assets at a fixed price so you don't have to worry anymore about your budget or license limits.

What's included

  • Unlimited vulnerability scans for unlimited assets

  • Support by Certified CompTIA PenTest+ Professional

  • Access to Support Portal

  • Email Support Monday through Friday 9AM-5PM EST

  • Vulnerability Database Updates

  • Software Maintenance with Patches and Bug Fixes

  • Unlimited Support Cases

  • Software Updates and Upgrades

Why should I get a subscription now?

Enjoy the peace of mind and confidence that comes from having Mageni working for you.

For the Earth

Like you, we love the planet, that's why Mageni is a Stripe Climate member and 1% of your subscription goes to carbon removal.

Start for Free plus Money-back Guarantee

Get started for free with 7 days trial plus your eligible for a full reimbursement within 7 calendar days of the end of your trial. You don't need a reason to request a refund and we won't ask you a question.

Talk to a CompTIA Pentest+ when you need

CompTIA PenTest+ is the certification for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA Pentest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Payments Processed By Stripe

For your security all subscriptions made through this website (mageni.net) are processed by Stripe (stripe.com). Stripe has been audited by an independent PCI Qualified Security Assessor (QSA) and is certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

Frequently asked questions

Can’t find the answer? Send an email to help@mageni.net

Do you offer a free plan?
No, and the reason is that to provide you a great service Mageni have invested heavily in people, process and technology. The personal developing the product and providing support is CompTIA PenTest+ certified. The infrastructure uses Amazon AWS datacenters which are state of the art. So the subscription is priced at only $4 USD per month to provide you a great service at the most affordable price.
Can I install Mageni in Windows, macOS and Linux?
Yes, please read the documentation for details.
Can I get a refund?
Yes, contact us within the first 7 days after the end of the trial and we'll send you the refund. No questions asked
Who process my credit card information?
Stripe a PCI DSS Certified payment platform
Can I cancel the subscription?
Yes, please feel free to cancel your subscription at anytime
Can I pause the subscription?
Yes, please feel free to pause your subscription at anytime. While is paused it won't generate charges but you won't receive updates.
Can I delete my account?
Yes, please feel free to do so at anytime, just make sure that prior to that you cancel your subscription
What are support hours?
Monday to Friday from 9AM to 5PM EST (New York)
Can I verify the CompTIA Pentest+ Certification?
Yes, please contact us
Is this subscription a contract?
No, you can cancel it at anytime that you wish.
How can I open a support ticket?
Please visit the support portal
Is the license limited per installation?
If you are a MSP (Managed Service Provider) or a Security Company, yes, the license is limited and please contact us for pricing. If you are an organization who whishes to install it on many branches the license is not limited and you can use the same license to install Mageni in your branches.

Ready to get started? Start you 7-day free trial