CVE-2025-27655
Published: 05 March 2025
Description
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Security Summary
CVE-2025-27655 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.862 when running Application versions prior to 20.0.2014. Designated as CPA v1 V-2023-009, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no authentication or privileges and can exploit the flaw over the network with low complexity and no user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing attackers to manipulate server-side requests for unauthorized actions such as internal network scanning or service abuse.
Mitigation details are outlined in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, with comprehensive analysis of this flaw alongside 82 other vulnerabilities in Pierre Kim's advisory at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html. A related full disclosure appears on Seclists at http://seclists.org/fulldisclosure/2025/Apr/18. Upgrading to Virtual Appliance Host 22.0.862 Application 20.0.2014 or later addresses the issue.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SSRF in public-facing web app directly enables T1190 for initial exploitation; description explicitly notes internal network scanning enabling T1046 Network Service Discovery.