Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27647: n/a

0
Critical
VulnerabilityCVE-2025-27647cvecve-2025-27647
Published: Wed Mar 05 2025 (03/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Addition of Partial Admin Users Without Authentication V-2024-002.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:02:10 UTC

Technical Analysis

CVE-2025-27647 is a critical security vulnerability affecting Vasion Print (formerly PrinterLogic) software versions prior to Virtual Appliance Host 22.0.913 Application 20.0.2253. The vulnerability, classified under CWE-306 (Missing Authentication for Critical Function), allows an unauthenticated attacker to add partial administrative users to the system. This means an attacker can create accounts with elevated privileges without any authentication or user interaction, remotely over the network. The CVSS v3.1 score of 9.8 reflects the high severity, with attack vector being network-based (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The flaw essentially bypasses authentication controls, enabling attackers to gain administrative access to the print management system. This can lead to unauthorized control over printing infrastructure, data leakage, manipulation or deletion of print jobs, and potential pivoting to other network resources. No patches or exploit code are currently publicly available, but the vulnerability is already published and should be treated as critical. Organizations relying on Vasion Print for centralized print management must urgently assess their exposure and prepare for remediation.

Potential Impact

For European organizations, the impact of CVE-2025-27647 is significant. Unauthorized addition of admin users can lead to full compromise of print management infrastructure, which is often integrated with broader IT systems. This can result in data breaches involving sensitive documents, disruption of business operations due to denial of printing services, and potential lateral movement within corporate networks. Critical sectors such as government, finance, healthcare, and manufacturing that depend on secure and reliable printing services are particularly vulnerable. The loss of confidentiality, integrity, and availability can damage organizational reputation, lead to regulatory penalties under GDPR, and cause operational downtime. Given the network-exploitable nature and lack of authentication requirement, the vulnerability can be exploited by remote attackers without prior access, increasing the risk of widespread attacks across European enterprises.

Mitigation Recommendations

1. Immediate application of vendor patches or updates once they become available is paramount. Monitor Vasion Print vendor communications for security advisories. 2. Until patches are released, restrict network access to the Vasion Print management interfaces using firewalls and network segmentation to limit exposure to trusted administrators only. 3. Implement strict monitoring and alerting for any new user account creations or privilege escalations within the print management system. 4. Conduct regular audits of user accounts and permissions to detect unauthorized additions. 5. Employ multi-factor authentication (MFA) for administrative access where supported to add an additional security layer. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) to identify anomalous activities related to print server access. 7. Educate IT and security teams about the vulnerability to ensure rapid incident response if exploitation attempts are detected. 8. Review and harden overall print infrastructure security posture, including limiting administrative privileges to the minimum necessary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-03-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909153ec28fd46ded7bacf9

Added to database: 11/3/2025, 8:49:02 PM

Last enriched: 11/3/2025, 9:02:10 PM

Last updated: 11/5/2025, 2:15:22 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats