Cyber Posture

CVE-2025-27638

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27638 is a critical-severity Use of Hard-coded Password (CWE-259) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 31.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching and upgrading of vulnerable software components to remediate the hardcoded password flaw as specified in vendor advisories.

prevent

Mandates management of authenticators including changing defaults and prohibiting weak or hardcoded passwords to block unauthorized access.

detect

Enables vulnerability scanning to identify the presence of CVE-2025-27638 in deployed systems for proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Hardcoded password vulnerability directly enables use of known valid credentials for remote unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows Hardcoded Password V-2024-013.

Deeper analysisAI

CVE-2025-27638 is a hardcoded password vulnerability (CWE-259), designated as V-2024-013, affecting Vasion Print, formerly known as PrinterLogic. It impacts Virtual Appliance Host versions prior to 22.0.1002 and Application versions prior to 20.0.2614. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its potential for severe impact.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation grants high-level impacts on confidentiality, integrity, and availability, likely enabling unauthorized access via the hardcoded credentials.

Advisories recommend upgrading to Virtual Appliance Host 22.0.1002 or later and Application 20.0.2614 or later to mitigate the issue. Further details on patches and remediation are provided in the PrinterLogic security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's disclosure of 83 Vasion/PrinterLogic vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list entry at http://seclists.org/fulldisclosure/2025/Apr/18.

Details

CWE(s)

Affected Products

printerlogic
vasion print
≤ 20.0.2614
printerlogic
virtual appliance
≤ 22.0.1002

CVEs Like This One

CVE-2025-27645Same product: Printerlogic Vasion Print
CVE-2025-27641Same product: Printerlogic Vasion Print
CVE-2025-27666Same product: Printerlogic Vasion Print
CVE-2025-27680Same product: Printerlogic Vasion Print
CVE-2025-27655Same product: Printerlogic Vasion Print
CVE-2025-27659Same product: Printerlogic Vasion Print
CVE-2025-27663Same product: Printerlogic Vasion Print
CVE-2025-27652Same product: Printerlogic Vasion Print
CVE-2025-27643Same product: Printerlogic Vasion Print
CVE-2025-27667Same product: Printerlogic Vasion Print

References