CVE-2025-27684
Published: 05 March 2025
Summary
CVE-2025-27684 is a high-severity Insertion of Sensitive Information Into Debugging Code (CWE-215) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 31.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-28 (Protection of Information at Rest) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely remediation through vendor patching to Virtual Appliance Host 1.0.735 Application 20.0.1330 or later, which removes sensitive data from the debug bundle.
Prevents cleartext storage and disclosure of sensitive information such as credentials and configuration details within the debug bundle by implementing cryptographic protections for data at rest.
Ensures configuration settings for the virtual appliance exclude or sanitize sensitive data in debug bundles, addressing improper exposure in diagnostic outputs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables remote unauthenticated access to a debug bundle with cleartext sensitive data including credentials, directly facilitating T1552.001 by providing unsecured credentials in files.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003.
Deeper analysisAI
CVE-2025-27684 is a vulnerability in Vasion Print, formerly known as PrinterLogic, affecting Virtual Appliance Host versions before 1.0.735 with Application versions before 20.0.1330. It involves the debug bundle containing sensitive data, mapped to CWE-215 (cleartext storage of sensitive information). The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network-accessible confidentiality impact.
Remote attackers require no privileges, authentication, or user interaction and face low attack complexity to exploit this flaw. Successful exploitation enables disclosure of sensitive data within the debug bundle, potentially compromising configuration details, credentials, or other proprietary information hosted on the appliance.
Advisories recommend upgrading to Virtual Appliance Host 1.0.735 Application 20.0.1330 or later to mitigate the issue. Additional details on patches and remediation are available in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's disclosure of 83 related vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list post at http://seclists.org/fulldisclosure/2025/Apr/18.
Details
- CWE(s)