CVE-2025-27661

9.1 CRITICAL

📋 TL;DR

This CVE describes a session fixation vulnerability in Vasion Print (formerly PrinterLogic) that allows attackers to hijack user sessions. Attackers can fix session identifiers before authentication, then gain unauthorized access to the application after users log in. Organizations using affected versions of Vasion Print Virtual Appliance Host and Application are vulnerable.

💻 Affected Systems

Products:
  • Vasion Print Virtual Appliance Host
  • Vasion Print Application
Versions: Virtual Appliance Host before 22.0.843, Application before 20.0.1923
Operating Systems: All supported OS for Vasion Print
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the web management interface of Vasion Print deployments. Both on-premises and cloud deployments may be affected depending on version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the print management system allowing attackers to access sensitive print jobs, modify printer configurations, deploy malicious drivers, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to print management interface leading to data exposure, printer configuration changes, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place, though session hijacking remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Session fixation attacks typically require some user interaction (victim logging in) but are well-understood attack patterns with low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.843 or later, Application 20.0.1923 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Virtual Appliance Host 22.0.843 or later. 3. Update Application to 20.0.1923 or later. 4. Restart services. 5. Verify session management is working correctly.

🔧 Temporary Workarounds

Session Management Hardening

all

Implement additional session security controls at the web server or load balancer level

Network Segmentation

all

Restrict access to Vasion Print management interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Vasion Print management interface
  • Enable multi-factor authentication and monitor for suspicious login patterns

🔍 How to Verify

Check if Vulnerable:

Check Vasion Print version in administration console: Virtual Appliance Host version < 22.0.843 OR Application version < 20.0.1923

Check Version:

Check via Vasion Print web interface: Admin Console → System Information

Verify Fix Applied:

Confirm Virtual Appliance Host version >= 22.0.843 AND Application version >= 20.0.1923, then test session management by logging out/in and verifying session IDs change

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions from same user with identical session IDs
  • Session IDs not regenerating after authentication
  • Unusual login patterns or locations

Network Indicators:

  • HTTP requests with fixed session cookies across authentication events
  • Session cookie manipulation attempts

SIEM Query:

source="vasion_print" AND (event="session_fixation" OR (session_id_reuse=true AND auth_event=true))

🔗 References

📤 Share & Export