CVE-2025-27665

9.8 CRITICAL

📋 TL;DR

This vulnerability in Vasion Print (formerly PrinterLogic) allows insufficient antivirus protection that could permit drivers containing known malicious code to execute. Systems running Virtual Appliance Host versions before 22.0.843 and Application versions before 20.0.1923 are affected. This could lead to malware execution on print servers and potentially connected systems.

💻 Affected Systems

Products:
  • Vasion Print
  • PrinterLogic
Versions: Virtual Appliance Host before 22.0.843, Application before 20.0.1923
Operating Systems: All supported OS for Vasion Print Virtual Appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the virtual appliance deployment model; SaaS deployments may have different patching requirements.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the print server leading to ransomware deployment, lateral movement to connected systems, and data exfiltration from the entire print infrastructure.

🟠

Likely Case

Malware execution on the print server resulting in service disruption, credential theft, and potential privilege escalation within the print management environment.

🟢

If Mitigated

Contained malware execution limited to the print server with minimal impact due to network segmentation and restricted permissions.

🌐 Internet-Facing: HIGH if print management interface is exposed to internet, as attackers could upload malicious drivers remotely.
🏢 Internal Only: HIGH as internal attackers or compromised accounts could exploit this to deploy malware across the print infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to upload drivers, which typically requires administrative access or compromised credentials. The CWE-693 (Protection Mechanism Failure) suggests the antivirus scanning is bypassed rather than a direct code execution flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.843 or later, Application 20.0.1923 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download updated Virtual Appliance from vendor portal. 3. Deploy new Virtual Appliance version 22.0.843+. 4. Update Application component to 20.0.1923+. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Restrict Driver Uploads

all

Temporarily disable or restrict driver upload functionality until patching can be completed

# Configure via Vasion Print admin interface: Settings > Security > Driver Management > Restrict Uploads

Enhanced Antivirus Scanning

linux

Implement additional antivirus scanning on the virtual appliance host system

# Install and configure additional AV on the host OS
# Example for Ubuntu: sudo apt install clamav && sudo freshclam

🧯 If You Can't Patch

  • Network segment print servers from critical systems and implement strict firewall rules
  • Implement application allowlisting to prevent execution of unauthorized binaries on print servers

🔍 How to Verify

Check if Vulnerable:

Check Virtual Appliance version in admin interface: Settings > About. Verify version is below 22.0.843 for Host or 20.0.1923 for Application.

Check Version:

# SSH to virtual appliance and check version: cat /opt/printerlogic/version.txt || dpkg -l | grep printerlogic

Verify Fix Applied:

Confirm version shows 22.0.843 or higher for Virtual Appliance Host and 20.0.1923 or higher for Application component.

📡 Detection & Monitoring

Log Indicators:

  • Unusual driver upload events
  • Antivirus scan bypass alerts
  • Unexpected process execution from driver directories

Network Indicators:

  • Unusual outbound connections from print servers
  • Traffic to known malicious IPs from print infrastructure

SIEM Query:

source="vasion-print" (event_type="driver_upload" OR event_type="antivirus_bypass") | stats count by src_ip, user

🔗 References

📤 Share & Export