http://www.nessus.org/u?0c042cd5
http://www.openwall.com/lists/oss-security/2020/06/08/2
http://www.nessus.org/u?ea3b09f9
https://github.com/corelight/callstranger-detector
https://github.com/yunuscadirci/CallStranger
https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00017.html
http://www.nessus.org/u?295dd500
http://www.nessus.org/u?bf195f28
http://www.nessus.org/u?4945377c
https://usn.ubuntu.com/4494-1/
https://www.debian.org/security/2020/dsa-4806
https://www.debian.org/security/2021/dsa-4898
Severity: High
ID: 505062
File Name: tenable_ot_epson_CVE-2020-12695.nasl
Version: 1.2
Type: remote
Family: Tenable.ot
Published: 2/5/2026
Updated: 2/6/2026
Supported Sensors: Tenable OT Security
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:C
CVSS Score Source: CVE-2020-12695
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.7
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/h:epson:xp-440:-, cpe:/h:epson:xp-8600:-, cpe:/h:epson:xp-100:-, cpe:/h:epson:xp-241:-, cpe:/h:epson:ep-101:-, cpe:/h:epson:xp-4105:-, cpe:/h:epson:xp-2101:-, cpe:/h:epson:xp-2105:-, cpe:/h:epson:xp-320:-, cpe:/h:epson:ew-m970a3t:-, cpe:/h:epson:xp-330:-, cpe:/h:epson:m571t:-, cpe:/h:epson:xp-970:-, cpe:/h:epson:xp-702:-, cpe:/h:epson:xp-8500:-, cpe:/h:epson:xp-630:-, cpe:/h:epson:xp-960:-, cpe:/h:epson:xp-340:-, cpe:/h:epson:xp-620:-, cpe:/h:epson:xp-4100:-
Required KB Items: Tenable.ot/EPSON
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/8/2020
Vulnerability Publication Date: 6/8/2020
CVE: CVE-2020-12695
CWE: 276