CVE-2025-34194

7.8 HIGH

📋 TL;DR

This vulnerability allows local unprivileged users to escalate privileges to SYSTEM level by exploiting insecure temporary file handling in Vasion Print (formerly PrinterLogic). The software creates files as SYSTEM in user-controlled temporary directories, enabling attackers to write arbitrary files and gain full system control. Affected systems include Vasion Print Virtual Appliance Host versions before 25.1.102 and Application versions before 25.1.1413 on Windows.

💻 Affected Systems

Products:
  • Vasion Print (formerly PrinterLogic) Virtual Appliance Host
  • Vasion Print (formerly PrinterLogic) Application
Versions: Virtual Appliance Host: versions prior to 25.1.102; Application: versions prior to 25.1.1413 (Windows client deployments)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects PrinterInstallerClient components in Windows client deployments. Virtual Appliance Host versions are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, modify system files, steal credentials, and maintain persistent access.

🟠

Likely Case

Local privilege escalation leading to administrative control of the affected system, enabling configuration changes, binary injection, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and temporary directory permissions are hardened.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any local user on affected systems can exploit this to gain SYSTEM privileges, posing significant internal threat.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but is straightforward once local access is obtained. The vulnerability involves symbolic link attacks in user-controlled temporary directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host: 25.1.102 or later; Application: 25.1.1413 or later

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Identify affected Vasion Print installations. 2. Update Virtual Appliance Host to version 25.1.102 or later. 3. Update Application to version 25.1.1413 or later for Windows deployments. 4. Restart affected services and systems. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict temporary directory permissions

windows

Modify permissions on C:\Users\%USER%\AppData\Local\Temp\ to prevent symbolic link creation by non-administrative users

icacls "C:\Users\%USERNAME%\AppData\Local\Temp" /deny %USERNAME%:(OI)(CI)(DE,DC,WD,AD,WDAC,WO)

Disable PrinterInstallerClient service

windows

Temporarily disable the vulnerable PrinterInstallerClient component if not required

sc stop PrinterInstallerClient
sc config PrinterInstallerClient start= disabled

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts on affected systems
  • Monitor for suspicious file creation activities in user temporary directories and for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Vasion Print version: Virtual Appliance Host versions below 25.1.102 or Application versions below 25.1.1413 on Windows are vulnerable

Check Version:

Check Vasion Print administration console or application properties for version information

Verify Fix Applied:

Verify installed version is Virtual Appliance Host 25.1.102+ or Application 25.1.1413+ and test for privilege escalation attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in SYSTEM context within user temp directories
  • Privilege escalation attempts from local user to SYSTEM
  • Symbolic link creation in C:\Users\*\AppData\Local\Temp\

Network Indicators:

  • No specific network indicators as this is local exploitation

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%PrinterInstallerClient%' AND SubjectUserName!=SYSTEM AND TokenElevationType=%%1938

🔗 References

📤 Share & Export