{"id":86745,"date":"2026-03-22T00:36:18","date_gmt":"2026-03-22T00:36:18","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2025-35970-administrator-privilege-elevation-vulnerability-in-seiko-epson-and-fujifilm-corporation-products","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-35970-administrator-privilege-elevation-vulnerability-in-seiko-epson-and-fujifilm-corporation-products\/","title":{"rendered":"<strong>CVE-2025-35970: Administrator Privilege Elevation Vulnerability in SEIKO EPSON and FUJIFILM Corporation Products<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This report addresses a critical vulnerability, CVE-2025-35970, detected in several products of SEIKO EPSON and FUJIFILM Corporation. The vulnerability arises because the initial administrator password, which is easily discernible via SNMP, potentially allowing nefarious entities with SNMP access to log in with administrator privileges. It is of paramount importance due to its potential to compromise systems and leak sensitive data.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-35970<br \/>\nSeverity: High (7.5 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: System Compromise and Data Leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1961166978\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>SEIKO EPSON | All versions until patched<br \/>\nFUJIFILM Corporation | All versions until patched<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit works by leveraging the Simple Network Management Protocol (SNMP) to retrieve valuable information about the network device, including the default administrator password. This vulnerability is mainly due to poor security practices during the initial setup of the devices. If the default password is not changed, an attacker with SNMP access can log in as an administrator and gain complete control over the device and potentially, the entire network.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3218619778\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>This is a conceptual example of how an attacker might use an SNMP get request to retrieve the default administrator password:<\/p>\n<pre><code class=\"\" data-line=\"\">snmpwalk -v 2c -c public target.example.com 1.3.6.1.4.1.674.10892.1.300.10.1.9.1<\/code><\/pre>\n<p>In this example, &#8220;public&#8221; is the community string (akin to a password for SNMP), and the long number is the Object Identifier (OID) which corresponds to the administrator password. If the device is vulnerable and the administrator password has not been changed, this command will return the default password.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This report addresses a critical vulnerability, CVE-2025-35970, detected in several products of SEIKO EPSON and FUJIFILM Corporation. The vulnerability arises because the initial administrator password, which is easily discernible via SNMP, potentially allowing nefarious entities with SNMP access to log in with administrator privileges. It is of paramount importance due to its potential to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-86745","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=86745"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86745\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=86745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=86745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=86745"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=86745"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=86745"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=86745"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=86745"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=86745"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=86745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}