CVE-2025-27665
Published: 05 March 2025
Summary
CVE-2025-27665 is a critical-severity Protection Mechanism Failure (CWE-693) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-3 (Malicious Code Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires malicious code protection mechanisms, including antivirus scanning and signature updates, which were insufficient in this CVE allowing known malicious drivers (OVE-20230524-0009) to bypass detection and execute.
Mandates identification, reporting, and timely correction of flaws like this protection mechanism failure, aligning with the vendor patch to Virtual Appliance Host 22.0.843 Application 20.0.1923.
Requires integrity checks on software and firmware, which could detect unauthorized modifications or execution by malicious drivers that bypassed antivirus.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote code execution flaw in a network-accessible virtual appliance (Vasion Print) due to insufficient antivirus protection allowing malicious drivers to bypass detection and execute, directly mapping to exploitation of a public-facing application.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Antivirus Protection and thus drivers can have known malicious code OVE-20230524-0009.
Deeper analysisAI
CVE-2025-27665 is a high-severity vulnerability (CVSS 3.1 score of 9.8) involving insufficient antivirus protection in Vasion Print, formerly known as PrinterLogic, specifically affecting versions prior to Virtual Appliance Host 22.0.843 Application 20.0.1923. The flaw, classified under CWE-693 (Protection Mechanism Failure), enables drivers containing known malicious code identified as OVE-20230524-0009 to bypass detection and execute. It was published on 2025-03-05.
Remote attackers can exploit this vulnerability over the network with low complexity, requiring no privileges, user interaction, or special conditions (AV:N/AC:L/PR:N/UI:N/S:U). Successful exploitation grants high-impact access to confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing arbitrary code execution, data theft, system compromise, or denial of service on affected appliances.
Mitigation details are available in the vendor's security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, which likely covers patching to Virtual Appliance Host 22.0.843 Application 20.0.1923 or later.
Details
- CWE(s)