Cyber Posture

CVE-2025-27641

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-27641 is a critical improper authentication vulnerability (CWE-287) in Vasion Print, formerly known as PrinterLogic, affecting versions before Virtual Appliance Host 22.0.951 Application 20.0.2368. It enables unauthenticated access to APIs for Single-Sign On, designated as V-2024-009. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact.

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, authentication, or user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling full system control on affected appliances.

Mitigation guidance and patches are detailed in vendor advisories, including PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm. Additional analysis appears in Pierre Kim's blog post on 83 Vasion/PrinterLogic vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html and a Full Disclosure mailing list entry at http://seclists.org/fulldisclosure/2025/Apr/18.

Details

CWE(s)
CWE-287

Affected Products

printerlogic
vasion print
≤ 20.0.2368
printerlogic
virtual appliance
≤ 22.0.951

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Improper authentication vulnerability enabling unauthenticated remote access to SSO APIs on a public-facing virtual appliance directly facilitates exploitation of public-facing applications for initial access and potential full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References