Epson Printer Controller Installer
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Epson Printer Controller Installer.
By the Year
In 2026 there have been 1 vulnerability in Epson Printer Controller Installer with an average score of 7.8 out of ten.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.80 |
It may take a day or so for new Epson Printer Controller Installer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Epson Printer Controller Installer Security Vulnerabilities
Epson InstallNavi Helper Local Priv Esc via XPC on macOS
CVE-2025-4960
7.8 - High
- February 19, 2026
The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOSs authorization model, exposing privileged functionality to untrusted users. Although it invokes the AuthorizationCopyRights API, it does so using overly permissive custom rights that it registers in the systems authorization database (/var/db/auth.db). These rights can be requested and granted by the authorization daemon to any local user, regardless of privilege level. As a result, an attacker can exploit the vulnerable service to perform privileged operations such as executing arbitrary commands or installing system components without requiring administrative credentials.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Epson Printer Controller Installer or by Epson? Click the Watch button to subscribe.