CVE-2025-27661
Published: 05 March 2025
Summary
CVE-2025-27661 is a critical-severity Session Fixation (CWE-384) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 41.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and correction of system flaws, directly mitigating this CVE by applying the vendor patch to vulnerable Vasion Print versions.
SC-23 enforces mechanisms to protect the authenticity of communications sessions and prevent compromise of session identifiers, directly countering session fixation attacks.
AC-12 mandates automated session termination after defined conditions, limiting the exploitation window for fixed sessions in Vasion Print.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Session fixation in public-facing web app enables remote unauthenticated exploitation (T1190) and use of forged web session cookies to hijack authenticated sessions (T1550.004).
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Session Fixation OVE-20230524-0004.
Deeper analysisAI
CVE-2025-27661 is a session fixation vulnerability (CWE-384, tracked as OVE-20230524-0004) in Vasion Print, formerly known as PrinterLogic. It affects versions prior to Virtual Appliance Host 22.0.843 Application 20.0.1923. The vulnerability was published on 2025-03-05 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and without requiring user interaction. Successful exploitation enables high-impact compromise of confidentiality and integrity, allowing attackers to fixate and potentially hijack user sessions.
Mitigation details are available in the vendor's security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm.
Details
- CWE(s)