CVE-2025-27642
Published: 05 March 2025
Summary
CVE-2025-27642 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 directly addresses the vulnerability by requiring identification and limitation of actions permitted without authentication, such as driver package editing.
AC-3 enforces approved authorizations for access to system resources, preventing unauthenticated modifications to driver packages.
CM-5 restricts access to configuration changes on system components, mitigating unauthorized editing of driver packages as a critical change activity.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows remote unauthenticated exploitation of a public-facing application (virtual appliance) to edit driver packages, directly mapping to T1190 for initial access and broader system control.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Unauthenticated Driver Package Editing V-2024-008.
Deeper analysisAI
CVE-2025-27642 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) published on 2025-03-05, affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions before 22.0.933 Application 20.0.2368. The issue, tracked as V-2024-008, enables unauthenticated driver package editing and is rooted in CWE-306 (Missing Authentication for Critical Function).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially enabling attackers to modify driver packages in ways that lead to broader system control.
Advisories and further details on mitigation are available in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's analysis of 83 Vasion/PrinterLogic vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list posting at http://seclists.org/fulldisclosure/2025/Apr/18.
Details
- CWE(s)