Cyber Posture

CVE-2025-27661

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0037 58.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27661 is a critical-severity Session Fixation (CWE-384) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 41.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of system flaws, directly mitigating this CVE by applying the vendor patch to vulnerable Vasion Print versions.

prevent

SC-23 enforces mechanisms to protect the authenticity of communications sessions and prevent compromise of session identifiers, directly countering session fixation attacks.

prevent

AC-12 mandates automated session termination after defined conditions, limiting the exploitation window for fixed sessions in Vasion Print.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

Session fixation in public-facing web app enables remote unauthenticated exploitation (T1190) and use of forged web session cookies to hijack authenticated sessions (T1550.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Session Fixation OVE-20230524-0004.

Deeper analysisAI

CVE-2025-27661 is a session fixation vulnerability (CWE-384, tracked as OVE-20230524-0004) in Vasion Print, formerly known as PrinterLogic. It affects versions prior to Virtual Appliance Host 22.0.843 Application 20.0.1923. The vulnerability was published on 2025-03-05 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and without requiring user interaction. Successful exploitation enables high-impact compromise of confidentiality and integrity, allowing attackers to fixate and potentially hijack user sessions.

Mitigation details are available in the vendor's security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm.

Details

CWE(s)

Affected Products

printerlogic
vasion print
≤ 20.0.1923
printerlogic
virtual appliance
≤ 22.0.843

CVEs Like This One

CVE-2025-27641Same product: Printerlogic Vasion Print
CVE-2025-27666Same product: Printerlogic Vasion Print
CVE-2025-27659Same product: Printerlogic Vasion Print
CVE-2025-27652Same product: Printerlogic Vasion Print
CVE-2025-27649Same product: Printerlogic Vasion Print
CVE-2025-27668Same product: Printerlogic Vasion Print
CVE-2025-27670Same product: Printerlogic Vasion Print
CVE-2025-27681Same product: Printerlogic Vasion Print
CVE-2025-27657Same product: Printerlogic Vasion Print
CVE-2025-27664Same product: Printerlogic Vasion Print

References