Cyber Posture

CVE-2025-27678

CriticalRCE

Published: 05 March 2025

Published
05 March 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0464 89.4th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27678 is a critical-severity Code Injection (CWE-94) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 10.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of known flaws like CVE-2025-27678 through vendor patches to Virtual Appliance Host 22.0.843 and Application 20.0.1923.

detect

Mandates vulnerability scanning and monitoring to identify systems running vulnerable versions of Vasion Print affected by this unauthenticated RCE.

prevent

Enforces input validation to block code injection (CWE-94) exploits enabling remote code execution on Vasion Print clients.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The CVE describes an unauthenticated client-side remote code execution vulnerability (CWE-94) in Vasion Print that allows remote attackers to execute arbitrary code on affected clients with no user interaction, directly mapping to Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Client Remote Code Execution V-2023-001.

Deeper analysisAI

CVE-2025-27678 is a client remote code execution vulnerability (CWE-94) in Vasion Print, formerly known as PrinterLogic, affecting versions before Virtual Appliance Host 22.0.843 and Application 20.0.1923. Published on 2025-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact without authentication or user interaction.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity. Successful exploitation enables remote code execution on affected clients, compromising confidentiality, integrity, and availability to a high degree.

Mitigation requires upgrading to Virtual Appliance Host 22.0.843 Application 20.0.1923 or later. Additional details on patches and advisories are provided in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's analysis of 83 related vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list entry at http://seclists.org/fulldisclosure/2025/Apr/18.

Details

CWE(s)

Affected Products

printerlogic
vasion print
≤ 20.0.1923
printerlogic
virtual appliance
≤ 22.0.843

CVEs Like This One

CVE-2025-27657Same product: Printerlogic Vasion Print
CVE-2025-27674Same product: Printerlogic Vasion Print
CVE-2025-27642Same product: Printerlogic Vasion Print
CVE-2025-27651Same product: Printerlogic Vasion Print
CVE-2025-27649Same product: Printerlogic Vasion Print
CVE-2025-27685Same product: Printerlogic Vasion Print
CVE-2025-27661Same product: Printerlogic Vasion Print
CVE-2025-27645Same product: Printerlogic Vasion Print
CVE-2025-27643Same product: Printerlogic Vasion Print
CVE-2025-27668Same product: Printerlogic Vasion Print

References