Guías y notificaciones de seguridad de Epson

Manifiesto de seguridad de Epson

Para garantizar la seguridad de todos sus clientes, Epson utiliza marcos de seguridad unificados y metodologías coherentes en todo el proceso de diseño y entrega de todos sus productos, desde dispositivos para oficinas y hogares hasta impresoras de recibos comerciales e industriales e impresoras de gran formato (LFP).


Más información 


Guía de seguridad para productos corporativos

Refuerza las capacidades funcionales de red de las impresoras y equipos multifunción corporativos para mejorar la facilidad de uso con una variedad de funciones de seguridad para ordenadores y servidores al conectarse y utilizar una red.

Guía de seguridad para el producto

Guía de seguridad:
Clientes que utilizan un entorno de red doméstica

Haga clic aquí

Guía de seguridad:
Clientes que utilizan un entorno de intranet corporativa

Haga clic aquí

Guía de seguridad:
Clientes que utilizan productos POS. Seleccione esta opción independientemente de su entorno de red.

Haga clic aquí

 

Lista de funciones y modelos compatibles

Función de impresora de inyección de tinta para empresas
Lista y modelos compatibles:

Haga clic aquí

Función de impresora comercial y de gran formato
Lista y modelos compatibles:

Haga clic aquí

Función de escáner
Lista y modelos compatibles:

Haga clic aquí

 

 

Documento técnico sobre seguridad e información para soluciones

Documento técnico sobre seguridad para
Epson Print Admin:

Haga clic aquí

Documento técnico sobre seguridad para
Epson Device Admin:

Haga clic aquí

Documento técnico sobre seguridad para
Document Capture Pro Server:

Haga clic aquí

Documento técnico sobre seguridad para
Epson Remote Services:

Haga clic aquí

 

 

Please select a security notification below for details:

Security Notification Product ID Release Date
Local privilege escalation in Windows OS through installed EPSON printers installed in non-English language -- CVE-2025-42598 18/04/2025
Insecure Initial Password Configuration in Epson WebConfig Vulnerability -- CVE-2024-47295 01/10/2024
Cross-Site Scripting (XSS) Vulnerability -- CVE-2023-23572 18/09/2023
Vulnerability in Web Config in Printer Products -- Haga clic aquí 03/08/2023
Vulnerability in Web Config in Printers and Network Interface Products -- CVE-2023-27520 09/06/2023
Security Measures for Epson Network Products -- Haga clic aquí 26/11/2020

Epson Vulnerability Disclosure Policy

Seiko Epson Corporation and its sales companies ("we", "us", "our") collect information on security vulnerabilities in our products and services (the "Products"), investigate their impact and disclose information as necessary to ensure that our customers can use our Products with confidence.

1. Application

This policy applies to all vulnerabilities (*1) reported to us. Customers are requested to read and comply with this policy carefully before reporting vulnerabilities.

*1: Vulnerability for the purposes of this policy is defined as an attack against a product that can adversely affect its confidentiality, integrity or availability.

2. How to report vulnerabilities

If you discover a new vulnerability (undisclosed vulnerability) for your product, please submit a report via the link below.

Report a Vulnerability

3. The process after a vulnerability report

3.1 Acknowledgement of receipt

The customer submitting the report (the "Rapporteur") will receive an acknowledgement of receipt from us within five working days, starting from the day after the day on which the report is sent.

3.2 Identification of vulnerabilities

The received vulnerabilities are checked by our technical team and the results are fed back to the reporter. In some cases, we may decide that the vulnerability is "not covered by the vulnerability response". For example, in the following cases.

  1. Known vulnerabilities.
  2. Product support is no longer available.

 

3.3 Addressing vulnerabilities

If we determine that the product is vulnerable, we will provide the reporter with a fixed module that addresses the vulnerability or provide a workaround. Please note that when we provide a fixed module, we may ask the reporter to confirm that the vulnerability has been properly addressed.

3.4 Vulnerability disclosure.

If it is deemed necessary to inform customers other than the reporter, the security advisory will be posted on the following website as soon as the information can be disclosed, so that customers can implement appropriate measures.

In addition, if the reporting party makes the disclosure, the reporting party is requested to coordinate the content of the disclosure (e.g. not including information that may give the attacker an advantage) and the schedule of the disclosure.

Security Advisery

4. About Rewards

We sincerely appreciate those who take the time and effort to report vulnerabilities in accordance with this policy, but we do not offer any compensation for reporting vulnerabilities. Thank you for your understanding.

5. Prohibitions against the reporter

  • With regard to the disclosure of vulnerabilities The reporting party must not disclose vulnerability-related information to third parties without a valid reason.
    However, if you need to disclose vulnerability-related information for legitimate reasons, please consult us in advance.
  • With regard to when vulnerabilities are discovered and verified Please do not do the following in order to search for and verify vulnerabilities:
    1. Violating applicable laws and regulations
    2. Accessing unnecessary, excessive or voluminous data
    3. Altering data on our systems or services
    4. Using high-intensity invasive or destructive scanning tools to discover vulnerabilities
    5. Attempting or reporting any form of denial of service, such as overwhelming our services with a high volume of requests
    6. Interfering with our services or systems

A partir del 1 de agosto de 2025, todos los dispositivos inalámbricos vendidos en la UE, el Reino Unido, Turquía y los países de la AELC deberán cumplir con la Directiva sobre equipos radioeléctricos (RED) actualizada.

¿Cuál es el objetivo?

Garantizar que los dispositivos:

  • Sean seguros de usar.
  • Estén protegidos contra las amenazas cibernéticas.
  • Sean compatibles con otras tecnologías.
  • Utilicen las frecuencias de radio de manera eficiente.

¿Qué cubre?

  • Teléfonos
  • Dispositivos WiFi/Bluetooth
  • GPS
  • Radios
  • y más...

Por qué es importante:

Los fabricantes deben cifrar los datos, proteger la privacidad de los usuarios y cumplir estrictas normas de seguridad, o se enfrentan a multas y prohibiciones de comercialización de sus productos.

Nota:

Los usuarios pueden desactivar algunas funciones RED si es necesario, pero los fabricantes deben suministrar los dispositivos con total conformidad.

Más información:

Descubra cómo RED influye en su producto Epson haciendo clic en el botón Más información.

Más información