Cyber Posture

CVE-2025-27655

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.

Security Summary

CVE-2025-27655 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.862 when running Application versions prior to 20.0.2014. Designated as CPA v1 V-2023-009, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.

Remote attackers require no authentication or privileges and can exploit the flaw over the network with low complexity and no user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing attackers to manipulate server-side requests for unauthorized actions such as internal network scanning or service abuse.

Mitigation details are outlined in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, with comprehensive analysis of this flaw alongside 82 other vulnerabilities in Pierre Kim's advisory at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html. A related full disclosure appears on Seclists at http://seclists.org/fulldisclosure/2025/Apr/18. Upgrading to Virtual Appliance Host 22.0.862 Application 20.0.2014 or later addresses the issue.

Details

CWE(s)
CWE-918

Affected Products

printerlogic
vasion print
≤ 20.0.2014
printerlogic
virtual appliance
≤ 22.0.862

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF in public-facing web app directly enables T1190 for initial exploitation; description explicitly notes internal network scanning enabling T1046 Network Service Discovery.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References