CVE-2025-27648
Published: 05 March 2025
Summary
CVE-2025-27648 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching directly prevents exploitation of the cross-tenant password exposure vulnerability in affected Vasion Print versions.
Authenticator management protects password content from unauthorized disclosure, directly addressing CWE-522 insufficiently protected credentials across tenants.
Access enforcement mechanisms prevent unauthenticated network attackers from reaching endpoints that expose cross-tenant passwords.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote exploit against a public-facing application (PrinterLogic/Vasion Print) that directly results in exposure of credentials due to insufficient protection (CWE-522), enabling initial access via T1190 and credential access via T1552.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Cross Tenant Password Exposure V-2024-003.
Deeper analysisAI
CVE-2025-27648 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) designated as Cross Tenant Password Exposure (V-2024-003) and mapped to CWE-522 (Insufficiently Protected Credentials). It affects Vasion Print, formerly known as PrinterLogic, specifically Virtual Appliance Host versions before 22.0.913 and Application versions before 20.0.2253. The vulnerability was published on 2025-03-05T06:15:36.523.
An unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation enables cross-tenant password exposure, resulting in high impacts to confidentiality, integrity, and availability.
Advisories and additional details on mitigation are provided in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's analysis of 83 related vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list post at http://seclists.org/fulldisclosure/2025/Apr/18.
Details
- CWE(s)