EPSON Printers Cross-site Scripting (CVE-2023-23572)

medium Tenable OT Security Plugin ID 505071

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Cross-site scripting vulnerability in SEIKO EPSON printers/network interface Web Config allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers/network interface via a web browser. According to SEIKO EPSON CORPORATION, it is also called as Remote Manager in some products. Web Config is pre-installed in some printers/network interface provided by SEIKO EPSON CORPORATION.
For the details of the affected product names/model numbers, refer to the information provided by the vendor.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://jvn.jp/en/jp/JVN82424996/

https://www.epson.jp/support/misc_t/230308_oshirase.htm

Plugin Details

Severity: Medium

ID: 505071

File Name: tenable_ot_epson_CVE-2023-23572.nasl

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 2/5/2026

Updated: 2/6/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:L/Au:M/C:P/I:P/A:N

CVSS Score Source: CVE-2023-23572

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:epson:lp-s3000z_firmware:-, cpe:/o:epson:lp-s7000_firmware:-, cpe:/o:epson:lp-s8100_firmware:-, cpe:/o:epson:esnsb1_firmware:-, cpe:/o:epson:lp-s3500_firmware:-, cpe:/o:epson:lp-9600_firmware:-, cpe:/o:epson:prifnw2_firmware:-, cpe:/o:epson:lp-s3000_firmware:-, cpe:/o:epson:prifnw1_firmware:-, cpe:/o:epson:lp-9800c_firmware:-, cpe:/o:epson:pa-w11g2_firmware:-, cpe:/o:epson:lp-s6500_firmware:-, cpe:/o:epson:lp-9200b_firmware:-, cpe:/o:epson:prifnw1s_firmware:-, cpe:/o:epson:pa-w11g_firmware:-, cpe:/o:epson:lp-s4000_firmware:-, cpe:/o:epson:lp-8200c_firmware:-, cpe:/o:epson:lp-s3000r_firmware:-, cpe:/o:epson:prifnw2sac_firmware:-, cpe:/o:epson:lp-9200ps2_firmware:-, cpe:/o:epson:esifnw1_firmware:-, cpe:/o:epson:lp-8500c_firmware:-, cpe:/o:epson:lp-s4500_firmware:-, cpe:/o:epson:esnsb2_firmware:-, cpe:/o:epson:lp-s5300_firmware:-, cpe:/o:epson:lp-s4200_firmware:-, cpe:/o:epson:prifnw7s_firmware:-, cpe:/o:epson:lp-s6000_firmware:-, cpe:/o:epson:prifnw2s_firmware:-, cpe:/o:epson:lp-9300_firmware:-, cpe:/o:epson:prifnw2ac_firmware:-, cpe:/o:epson:lp-s9000_firmware:-, cpe:/o:epson:lp-s7500_firmware:-, cpe:/o:epson:prifnw6_firmware:-, cpe:/o:epson:lp-9600s_firmware:-, cpe:/o:epson:lp-9200c_firmware:-, cpe:/o:epson:lp-s310n_firmware:-, cpe:/o:epson:lp-s7100_firmware:-, cpe:/o:epson:prifnw7_firmware:-, cpe:/o:epson:lp-s5000_firmware:-, cpe:/o:epson:lp-8700ps3_firmware:-, cpe:/o:epson:lp-s300n_firmware:-, cpe:/o:epson:lp-s7500ps_firmware:-, cpe:/o:epson:lp-s5500_firmware:-, cpe:/o:epson:lp-s5300r_firmware:-, cpe:/o:epson:prifnw7u_firmware:-, cpe:/o:epson:lp-s3000ps_firmware:-, cpe:/o:epson:prifnw3_firmware:-, cpe:/o:epson:prifnw3s_firmware:-, cpe:/o:epson:lp-9200ps3_firmware:-

Required KB Items: Tenable.ot/EPSON

Exploit Ease: No known exploits are available

Patch Publication Date: 4/11/2023

Vulnerability Publication Date: 4/11/2023

Reference Information

CVE: CVE-2023-23572

CWE: 79