Cyber Posture

CVE-2025-27680

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0023 45.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may modify system firmware to persist on systems.

Security Summary

CVE-2025-27680 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) affecting Vasion Print, formerly known as PrinterLogic, specifically versions of the Virtual Appliance Host before 1.0.750 Application 20.0.1442. The issue, tracked as V-2024-004, involves insecure firmware images due to insufficient verification of data authenticity (CWE-345), allowing flawed checks that fail to properly validate firmware integrity or origin.

Remote attackers require no privileges or user interaction and can exploit the vulnerability over the network with low attack complexity. Successful exploitation enables high-impact confidentiality and integrity violations, such as injecting or deploying malicious firmware images that bypass authenticity checks, potentially leading to unauthorized code execution or system compromise within the affected appliance.

Mitigation details are available in the vendor's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, along with analysis from independent researcher Pierre Kim's report on 83 vulnerabilities in Vasion/PrinterLogic at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html and a Full Disclosure mailing list entry at http://seclists.org/fulldisclosure/2025/Apr/18; upgrading to Virtual Appliance Host 1.0.750 Application 20.0.1442 or later addresses the issue.

Details

CWE(s)
CWE-345

Affected Products

printerlogic
vasion print
≤ 20.0.1442
printerlogic
virtual appliance
≤ 1.0.750

MITRE ATT&CK Enterprise Techniques

T1542.001 System Firmware Stealth
Adversaries may modify system firmware to persist on systems.
Why these techniques?

The vulnerability directly enables deployment of malicious firmware by bypassing authenticity/integrity checks (CWE-345), mapping to T1542.001 System Firmware for persistence or code execution on the appliance.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References