CVE-2025-27647

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Vasion Print (formerly PrinterLogic) allows unauthenticated attackers to create partial admin user accounts. Affected organizations using vulnerable versions of the Virtual Appliance Host and Application components are at risk of unauthorized administrative access.

💻 Affected Systems

Products:
  • Vasion Print
  • PrinterLogic Virtual Appliance
Versions: Virtual Appliance Host before 22.0.913, Application before 20.0.2253
Operating Systems: Linux (appliance-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the virtual appliance. Physical appliances may also be affected if running vulnerable software versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control over the print management system, enabling them to deploy malicious printers, intercept print jobs, move laterally within the network, or disrupt printing services entirely.

🟠

Likely Case

Attackers create backdoor admin accounts to maintain persistent access, potentially leading to data exfiltration, ransomware deployment, or further network compromise.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the print management system, though administrative compromise remains significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and proof-of-concept available in public disclosures. Attack requires network access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.913 or later, Application 20.0.2253 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Download latest patches from Vasion support portal. 2. Backup current configuration. 3. Apply Virtual Appliance Host update first. 4. Apply Application update. 5. Restart the appliance. 6. Verify all services are running.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to the management interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Management Interface

linux

Temporarily disable web management interface if not actively needed

systemctl stop apache2
systemctl disable apache2

🧯 If You Can't Patch

  • Isolate the print management appliance on a dedicated VLAN with strict firewall rules
  • Implement network-based intrusion detection to monitor for unauthorized admin user creation attempts

🔍 How to Verify

Check if Vulnerable:

Check version in web interface at https://[appliance-ip]/admin or via SSH: cat /opt/printerlogic/version.txt

Check Version:

ssh admin@appliance-ip 'cat /opt/printerlogic/version.txt'

Verify Fix Applied:

Verify version is 22.0.913 or higher for Host and 20.0.2253 or higher for Application. Test that unauthenticated admin user creation is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to user creation endpoints
  • New admin user accounts created from unexpected IP addresses
  • Failed authentication attempts followed by successful user creation

Network Indicators:

  • HTTP POST requests to /api/users or similar endpoints without authentication headers
  • Traffic to print management interface from unexpected sources

SIEM Query:

source="vasion-logs" AND (url_path="/api/users" OR event_type="user_created") AND user="anonymous"

🔗 References

📤 Share & Export