Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34191: CWE-59 Improper Link Following in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34191cvecve-2025-34191cwe-59cwe-276
Published: Fri Sep 19 2025 (09/19/2025, 18:51:42 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise. This vulnerability has been identified by the vendor as: V-2023-019 — Arbitrary File Write as Root.

AI-Powered Analysis

AILast updated: 11/24/2025, 15:19:45 UTC

Technical Analysis

CVE-2025-34191 affects Vasion Print Virtual Appliance Host versions prior to 22.0.843 and Application versions prior to 20.0.1923, specifically in macOS and Linux client deployments. The vulnerability stems from improper link following (CWE-59) in the handling of response files generated by print tasks. The service writes response data into files located under /opt/PrinterInstallerClient/tmp/responses/ using the requested filename without sanitizing or restricting symbolic links. Because the service runs with root privileges, an unprivileged local user can create symbolic links in the responses directory pointing to arbitrary files elsewhere on the filesystem. When the service writes response data, it follows these symbolic links and overwrites or creates files as root. This arbitrary file write capability enables attackers to modify configuration files, replace or inject malicious binaries or drivers, and escalate privileges to root, resulting in full system compromise. The vulnerability requires local access but no authentication or user interaction. The vendor has identified this issue as V-2023-019 and has not yet provided patches at the time of this report. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates local attack vector, low complexity, no authentication, and high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Vasion Print Virtual Appliance Host is deployed on Linux or macOS systems. Successful exploitation allows local attackers to gain root privileges, leading to complete system compromise. This can result in unauthorized access to sensitive print jobs, alteration or destruction of critical system files, and potential lateral movement within networks. The ability to inject malicious binaries or drivers could facilitate persistent backdoors or malware deployment, undermining organizational security and compliance with data protection regulations such as GDPR. Given that print infrastructure is often integrated into enterprise IT environments, disruption or compromise could affect business continuity and confidentiality of sensitive documents. The lack of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit with local access. Organizations with shared workstations, multi-user environments, or insufficient endpoint security controls are particularly vulnerable.

Mitigation Recommendations

Immediate mitigation should focus on restricting local access to systems running affected Vasion Print versions. Implement strict user permissions and limit the ability to create or modify files in the /opt/PrinterInstallerClient/tmp/responses/ directory. Employ filesystem monitoring to detect creation of suspicious symbolic links in this directory. Until patches are available, consider isolating print servers from general user environments or using network segmentation to limit local user access. Review and harden system configurations to minimize the number of users with local login capabilities. Deploy endpoint detection and response (EDR) solutions to identify anomalous file writes or privilege escalation attempts. Engage with Vasion to obtain and apply security patches as soon as they are released. Additionally, conduct regular audits of print infrastructure and maintain up-to-date backups to enable recovery from potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cdaa094b8a032c4fac9ae1

Added to database: 9/19/2025, 7:07:53 PM

Last enriched: 11/24/2025, 3:19:45 PM

Last updated: 12/16/2025, 7:56:38 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats