CVE-2025-27655

9.8 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Vasion Print (formerly PrinterLogic) that allows attackers to make unauthorized requests from the vulnerable server. The vulnerability affects Virtual Appliance Host versions before 22.0.862 and Application versions before 20.0.2014. Attackers could potentially access internal systems or services that should not be externally accessible.

💻 Affected Systems

Products:
  • Vasion Print
  • PrinterLogic
Versions: Virtual Appliance Host before 22.0.862, Application before 20.0.2014
Operating Systems: Linux (Virtual Appliance)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the CPA v1 component as referenced in V-2023-009. Systems using the virtual appliance deployment model are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot from the vulnerable server to access internal systems, steal sensitive data, or perform lateral movement within the network, potentially leading to full network compromise.

🟠

Likely Case

Attackers exploit the SSRF to access internal services, scan internal networks, or interact with cloud metadata services to obtain credentials and escalate privileges.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to the vulnerable server itself, preventing lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is part of a larger disclosure of 83 vulnerabilities in Vasion Print products, suggesting active research and potential exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.862 or later, Application 20.0.2014 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Download the latest version from the vendor portal. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart the virtual appliance. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from the Vasion Print server to only necessary services

Access Control Lists

all

Implement firewall rules to block the vulnerable server from accessing internal services

🧯 If You Can't Patch

  • Isolate the Vasion Print server in a dedicated network segment with strict egress filtering
  • Implement web application firewall (WAF) rules to detect and block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check the Virtual Appliance Host version in the admin interface or via SSH: cat /etc/printerlogic/version

Check Version:

ssh admin@vasion-print-server 'cat /etc/printerlogic/version'

Verify Fix Applied:

Verify the version is 22.0.862 or higher for Virtual Appliance Host, and 20.0.2014 or higher for Application

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the Vasion Print server
  • Requests to internal IP addresses or cloud metadata services

Network Indicators:

  • HTTP traffic from Vasion Print server to unexpected internal destinations
  • Requests to 169.254.169.254 (AWS metadata) or similar cloud endpoints

SIEM Query:

source="vasion-print" AND (dest_ip=169.254.169.254 OR dest_ip IN [RFC1918_RANGES]) AND NOT dest_ip IN [ALLOWED_DESTINATIONS]

🔗 References

📤 Share & Export