Cyber Posture

CVE-2025-27638

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2025-27638 is a hardcoded password vulnerability (CWE-259), designated as V-2024-013, affecting Vasion Print, formerly known as PrinterLogic. It impacts Virtual Appliance Host versions prior to 22.0.1002 and Application versions prior to 20.0.2614. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its potential for severe impact.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation grants high-level impacts on confidentiality, integrity, and availability, likely enabling unauthorized access via the hardcoded credentials.

Advisories recommend upgrading to Virtual Appliance Host 22.0.1002 or later and Application 20.0.2614 or later to mitigate the issue. Further details on patches and remediation are provided in the PrinterLogic security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's disclosure of 83 Vasion/PrinterLogic vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list entry at http://seclists.org/fulldisclosure/2025/Apr/18.

Details

CWE(s)
CWE-259

Affected Products

printerlogic
vasion print
≤ 20.0.2614
printerlogic
virtual appliance
≤ 22.0.1002

MITRE ATT&CK Enterprise Techniques

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Hardcoded password vulnerability directly enables use of known valid credentials for remote unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References