Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Vasion Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
Vendors & Products |
Microsoft
Microsoft windows Vasion Vasion virtual Appliance Application Vasion virtual Appliance Host |
Mon, 29 Sep 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced. | |
Title | Vasion Print (formerly PrinterLogic) Weak SSL/TLS Certificate Validation RCE | |
Weaknesses | CWE-295 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-09-29T20:44:01.002Z
Updated: 2025-09-30T15:04:58.888Z
Reserved: 2025-04-15T19:15:22.575Z
Link: CVE-2025-34235

Updated: 2025-09-30T15:04:54.656Z

Status : Received
Published: 2025-09-29T21:15:37.620
Modified: 2025-09-30T15:15:49.737
Link: CVE-2025-34235

No data.