Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
History

Tue, 30 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
Vendors & Products Microsoft
Microsoft windows
Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host

Mon, 29 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
Description Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Title Vasion Print (formerly PrinterLogic) Weak SSL/TLS Certificate Validation RCE
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-09-29T20:44:01.002Z

Updated: 2025-09-30T15:04:58.888Z

Reserved: 2025-04-15T19:15:22.575Z

Link: CVE-2025-34235

cve-icon Vulnrichment

Updated: 2025-09-30T15:04:54.656Z

cve-icon NVD

Status : Received

Published: 2025-09-29T21:15:37.620

Modified: 2025-09-30T15:15:49.737

Link: CVE-2025-34235

cve-icon Redhat

No data.