Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34194: CWE-59 Improper Link Following in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34194cvecve-2025-34194cwe-59cwe-377
Published: Fri Sep 19 2025 (09/19/2025, 18:46:12 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\SYSTEM inside a directory under the control of the local user (C:\Users\%USER%\AppData\Local\Temp\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 11/17/2025, 15:38:27 UTC

Technical Analysis

CVE-2025-34194 is a vulnerability in Vasion Print Virtual Appliance Host versions before 25.1.102 and Windows client versions before 25.1.1413. The vulnerability stems from improper handling of temporary files by the PrinterInstallerClient component, which creates files with NT AUTHORITY\SYSTEM privileges inside directories controlled by the local user (specifically under C:\Users\%USER%\AppData\Local\Temp\). Because the directory is user-controllable, an attacker can create symbolic links or manipulate filenames to redirect the service's file write operations to arbitrary locations on the filesystem. When the service follows these symbolic links, it writes files as SYSTEM, enabling an unprivileged local user to overwrite or create files with elevated privileges. This can lead to local privilege escalation, allowing the attacker to modify critical configuration files, replace or inject malicious binaries, and compromise the confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction or authentication beyond local access, making it relatively easy to exploit in environments where local user accounts are accessible. Although the vulnerability has been confirmed as remediated, the exact patch release date is not specified, and no public exploits have been observed. The CVSS 4.0 score of 8.5 reflects the high impact on system security and the low complexity of exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Vasion Print Virtual Appliance Host or its Windows client versions are deployed. Successful exploitation allows local attackers to escalate privileges to SYSTEM, potentially leading to full system compromise. This can result in unauthorized modification or destruction of print service configurations, injection of malicious code, disruption of printing services, and broader compromise of networked systems if the print server is integrated with other critical infrastructure. Confidentiality may be breached if attackers access sensitive print jobs or system files. Integrity and availability are also at risk due to possible tampering or denial of print services. Organizations with shared or multi-user environments, such as enterprises, government agencies, and managed service providers, are particularly vulnerable. The lack of required user interaction and the ease of exploitation increase the threat level. Additionally, the unclear patch timeline may delay remediation efforts, prolonging exposure.

Mitigation Recommendations

European organizations should immediately verify their Vasion Print Virtual Appliance Host and client versions and apply the latest patches once available. Until patches are confirmed, restrict local user permissions to prevent unprivileged users from creating or manipulating files in the temporary directories used by the PrinterInstallerClient component. Implement strict access controls and monitoring on the C:\Users\%USER%\AppData\Local\Temp\ directory to detect and block symbolic link creation or suspicious file operations. Employ application whitelisting to prevent unauthorized binaries from executing, and use endpoint detection and response (EDR) tools to monitor for unusual file system activity indicative of exploitation attempts. Network segmentation can limit the spread of compromise from affected print servers. Regularly audit local user accounts and remove unnecessary privileges to reduce the attack surface. Finally, maintain up-to-date backups of critical configurations and system states to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a24b8a032c4fac76f2

Added to database: 9/19/2025, 6:53:22 PM

Last enriched: 11/17/2025, 3:38:27 PM

Last updated: 11/22/2025, 3:22:25 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats