CVE-2025-34188

7.8 HIGH

📋 TL;DR

This vulnerability allows local users to extract authentication session tokens from cleartext log files in Vasion Print (formerly PrinterLogic) deployments. Attackers can use these tokens to authenticate remotely to the SaaS environment without valid credentials, potentially gaining unauthorized access to sensitive systems and data. Affected users include those running vulnerable versions of the Virtual Appliance Host or macOS/Linux client deployments.

💻 Affected Systems

Products:
  • Vasion Print (formerly PrinterLogic) Virtual Appliance Host
  • Vasion Print (formerly PrinterLogic) Application
Versions: Virtual Appliance Host versions prior to 1.0.735, Application versions prior to 20.0.1330
Operating Systems: macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS and Linux client deployments. Windows deployments are not affected according to available information.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SaaS environment with administrative privileges, leading to data exfiltration, system manipulation, and lateral movement within the organization's network.

🟠

Likely Case

Unauthorized access to user accounts and sensitive print management data, potentially allowing attackers to view, modify, or delete print jobs and configurations.

🟢

If Mitigated

Limited impact if proper access controls, log file permissions, and monitoring are in place to detect and prevent token extraction attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to read log files, but the process of extracting tokens and using them for remote authentication is straightforward once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 1.0.735 or later, Application 20.0.1330 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Identify affected systems using version check commands. 2. Download and install the patched versions from official vendor sources. 3. Restart the affected services or systems as required. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict Log File Permissions

linux

Change permissions on log files to prevent unauthorized local users from reading them.

chmod 640 /path/to/vasion/logs/*.log
chown root:vasion /path/to/vasion/logs/*.log

Rotate and Secure Session Tokens

all

Force session token rotation and implement additional authentication factors.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to systems running vulnerable software
  • Enable comprehensive logging and monitoring for unauthorized access attempts to log files and suspicious authentication patterns

🔍 How to Verify

Check if Vulnerable:

Check version numbers in system configuration or using vendor-provided version check utilities. Examine log files for presence of cleartext session tokens (PHPSESSID, XSRF-TOKEN, laravel_session).

Check Version:

Consult vendor documentation for specific version check commands as they vary by deployment type.

Verify Fix Applied:

Confirm version is 1.0.735 or later for Virtual Appliance Host, or 20.0.1330 or later for Application. Verify log files no longer contain cleartext session tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log files
  • Multiple authentication attempts using extracted session tokens
  • Log entries containing cleartext session tokens

Network Indicators:

  • Unusual authentication patterns from unexpected IP addresses
  • Multiple session creations in short timeframes

SIEM Query:

source="vasion_logs" AND (event="log_file_access" OR token="PHPSESSID" OR token="XSRF-TOKEN" OR token="laravel_session")

🔗 References

📤 Share & Export