CVE-2025-34192

9.8 CRITICAL

📋 TL;DR

This vulnerability affects Vasion Print (formerly PrinterLogic) deployments using outdated OpenSSL 1.0.2h-fips, which has been end-of-life since 2019. Attackers could exploit known unpatched vulnerabilities in TLS/SSL processing or cryptographic operations to compromise systems. Affected users include those running Virtual Appliance Host versions prior to 22.0.893 and Application versions prior to 20.0.2140 on macOS/Linux client deployments.

💻 Affected Systems

Products:
  • Vasion Print (formerly PrinterLogic) Virtual Appliance Host
  • Vasion Print (formerly PrinterLogic) Application
Versions: Virtual Appliance Host versions prior to 22.0.893, Application versions prior to 20.0.2140
Operating Systems: macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS/Linux client deployments. Windows deployments may use different OpenSSL versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, data exfiltration, or man-in-the-middle attacks exploiting known OpenSSL vulnerabilities that have no patches available.

🟠

Likely Case

Information disclosure, session hijacking, or denial of service through exploitation of documented OpenSSL weaknesses in TLS/SSL implementations.

🟢

If Mitigated

Limited impact if systems are isolated, have strict network controls, and attackers cannot reach vulnerable services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation leverages known OpenSSL vulnerabilities from 2016-2019 that have public documentation and exploit code available elsewhere.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.893 or later, Application 20.0.2140 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Download latest version from vendor portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart affected services. 5. Verify OpenSSL version is updated.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks to reduce attack surface

TLS Configuration Hardening

all

Configure TLS settings to use only modern protocols and ciphers

# Example: Configure TLS 1.2+ only in application settings

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check OpenSSL version used by Vasion Print processes: lsof -p <pid> | grep libssl or check application logs for OpenSSL deprecation warnings

Check Version:

Check Vasion Print version in administration console or via vendor documentation

Verify Fix Applied:

Verify OpenSSL version is no longer 1.0.2h-fips and check application version meets minimum requirements

📡 Detection & Monitoring

Log Indicators:

  • OpenSSL deprecation warnings
  • TLS/SSL handshake failures
  • Unexpected cryptographic errors

Network Indicators:

  • Unusual TLS negotiation patterns
  • Exploitation attempts targeting known OpenSSL CVEs

SIEM Query:

source="vasion-print" AND ("OpenSSL 1.0.2" OR "deprecated" OR "TLS error")

🔗 References

📤 Share & Export