Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34191: CWE-59 Improper Link Following in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34191cvecve-2025-34191cwe-59cwe-276
Published: Fri Sep 19 2025 (09/19/2025, 18:51:42 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise. This vulnerability has been identified by the vendor as: V-2023-019 — Arbitrary File Write as Root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:40:58 UTC

Technical Analysis

CVE-2025-34191 is an arbitrary file write vulnerability classified under CWE-59 (Improper Link Following) and CWE-276 (Incorrect Default Permissions) affecting Vasion Print Virtual Appliance Host and Application versions prior to 22.0.843 and 20.0.1923 respectively. The vulnerability exists because the service responsible for handling print task responses writes files into the /opt/PrinterInstallerClient/tmp/responses/ directory by reusing the requested filename without properly validating or restricting symbolic links. Since the service runs as root, it follows symbolic links and writes data to arbitrary locations on the filesystem. This flaw allows a local, unprivileged user to create or overwrite any file on the system with root privileges, enabling them to modify configuration files, replace binaries or drivers, and ultimately escalate privileges to full system compromise. The vulnerability does not require user interaction or authentication beyond local access, making it easier to exploit in environments where local user accounts are available. The CVSS 4.0 vector indicates low attack complexity and no need for authentication, with high impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability is critical due to the potential for complete system takeover. The vendor has identified this issue as V-2023-019 and users are advised to upgrade to patched versions once available. Until patches are released, organizations should restrict local user access, enforce strict filesystem permissions on the responses directory, and monitor for suspicious symbolic link creation or file modifications. This vulnerability highlights the risks of improper symbolic link handling in privileged services and the importance of secure file operation practices.

Potential Impact

The vulnerability allows local unprivileged users to write arbitrary files as root, leading to local privilege escalation and full system compromise. Attackers can overwrite critical system files, inject malicious binaries or drivers, and alter configurations, potentially resulting in data breaches, service disruption, or persistent backdoors. The compromise of print infrastructure can also affect availability of printing services critical to business operations. Since the service runs with root privileges and the flaw requires only local access without user interaction, the impact is severe in multi-user environments or where local accounts are shared or weakly controlled. Organizations relying on Vasion Print in enterprise, government, or managed service environments face risks of insider threats or lateral movement by attackers who gain initial footholds on affected systems. The vulnerability undermines system integrity and confidentiality, and could be leveraged as a stepping stone for broader network compromise.

Mitigation Recommendations

1. Apply vendor patches immediately once available for Vasion Print Virtual Appliance Host (≥ 22.0.843) and Application (≥ 20.0.1923) versions. 2. Until patches are released, restrict local user access to affected systems to trusted personnel only. 3. Harden filesystem permissions on /opt/PrinterInstallerClient/tmp/responses/ to prevent creation or modification of symbolic links by unprivileged users. 4. Implement monitoring and alerting for creation of symbolic links or unexpected file changes in the responses directory. 5. Use mandatory access controls (e.g., SELinux, AppArmor) to limit the service’s ability to follow symbolic links or write outside intended directories. 6. Conduct regular audits of local user accounts and remove unnecessary privileges to reduce risk of exploitation. 7. Employ endpoint detection and response (EDR) solutions to detect suspicious file writes or privilege escalation attempts. 8. Educate administrators about the risks of symbolic link vulnerabilities and enforce secure coding and deployment practices for privileged services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cdaa094b8a032c4fac9ae1

Added to database: 9/19/2025, 7:07:53 PM

Last enriched: 2/27/2026, 1:40:58 AM

Last updated: 3/26/2026, 10:29:39 AM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses