Cyber Posture

CVE-2025-34195

CriticalPublic PoC

Published: 19 September 2025

Published
19 September 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0123 79.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34195 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vasion Virtual Appliance Application. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 20.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation requires timely patching of the vulnerable PrinterInstallerClient to versions with quoted paths, directly preventing RCE exploitation during driver installation.

preventdetect

Malicious code protection scans for and blocks attacker-placed executables like C:\Program.exe that exploit the unquoted path during driver installation.

detect

System monitoring detects anomalous executions from short-path locations or suspicious driver installation activities indicative of unquoted path exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1574.009 Path Interception by Unquoted Path Stealth
Adversaries may execute their own malicious payloads by hijacking vulnerable file path references.
Why these techniques?

The unquoted path vulnerability in the PrinterInstallerClient during driver installation enables path interception by unquoted path (T1574.009) and exploitation for privilege escalation (T1068), allowing arbitrary code execution with installer privileges.

NVD Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using…

more

an unquoted path under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints. This vulnerability has been identified by the vendor as: V-2022-006 — Driver Upload Security.

Deeper analysisAI

CVE-2025-34195 is a remote code execution vulnerability affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application versions prior to 20.0.1330 in Windows client deployments. The flaw arises in the PrinterInstallerClient driver-installation component, which launches programs using an unquoted path under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Due to the lack of quotes, the operating system prioritizes and may execute a program at a short-path location, such as C:\Program.exe, before reaching the intended binaries. This issue, mapped to CWE-434 (Unquoted Search Path or Element) and identified by the vendor as V-2022-006 (Driver Upload Security), carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability by placing or influencing the placement of a malicious program at the short-path location. During driver installation, the attacker's executable runs with the privileges of the installer process, which may be elevated, enabling arbitrary code execution, potential privilege escalation, and full compromise of the affected Windows endpoint.

Vendor security bulletins recommend upgrading to Virtual Appliance Host version 1.0.735 or later and Application version 20.0.1330 or later to mitigate the issue. Further details on patches and affected configurations are provided in advisories at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm and https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm, with additional analysis available from VulnCheck (https://www.vulncheck.com/advisories/vasion-print-printerlogic-unquoted-path-during-driver-installation) and Pierre Kim's report on 83 related vulnerabilities (https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-rce-01).

Details

CWE(s)

Affected Products

vasion
virtual appliance application
≤ 20.0.1330
vasion
virtual appliance host
≤ 1.0.735

CVEs Like This One

CVE-2025-34193Same product: Microsoft Windows
CVE-2025-34222Same product: Vasion Virtual Appliance Application
CVE-2025-34204Same product: Vasion Virtual Appliance Application
CVE-2025-34205Same product: Vasion Virtual Appliance Application
CVE-2025-34218Same product: Vasion Virtual Appliance Application
CVE-2025-34203Same product: Vasion Virtual Appliance Application
CVE-2025-34224Same product: Vasion Virtual Appliance Application
CVE-2025-34217Same product: Vasion Virtual Appliance Application
CVE-2025-34198Same product: Vasion Virtual Appliance Application
CVE-2025-34231Same product: Vasion Virtual Appliance Application

References