Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34194: CWE-59 Improper Link Following in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34194cvecve-2025-34194cwe-59cwe-377
Published: Fri Sep 19 2025 (09/19/2025, 18:46:12 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\SYSTEM inside a directory under the control of the local user (C:\Users\%USER%\AppData\Local\Temp\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 09/30/2025, 00:15:12 UTC

Technical Analysis

CVE-2025-34194 is a high-severity local privilege escalation vulnerability affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 for Windows client deployments. The vulnerability arises from improper handling of temporary files by the PrinterInstallerClient components. Specifically, the software creates files with SYSTEM-level privileges inside a directory controlled by the local user (C:\Users\%USER%\AppData\Local\Temp\). This insecure temporary-file handling allows a local, unprivileged attacker to place symbolic links or manipulate filenames in the temporary directory. When the service follows these symbolic links, it writes files as SYSTEM to arbitrary filesystem locations. This behavior enables an attacker to overwrite or create files with SYSTEM privileges, leading to local privilege escalation. The attacker can modify critical configuration files, replace or inject malicious binaries, or otherwise compromise the confidentiality, integrity, and availability of the affected system. The vulnerability is categorized under CWE-59 (Improper Link Following) and CWE-377 (Insecure Temporary File). Although a patch exists, the exact date of its introduction is unclear, and no known exploits have been reported in the wild to date. The CVSS 4.0 base score is 8.5, reflecting the high impact and relatively low complexity of exploitation, requiring only local access without user interaction or elevated privileges initially. This vulnerability is particularly dangerous because it allows privilege escalation from a low-privileged user to SYSTEM, the highest Windows privilege level, potentially enabling full system compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Vasion Print Virtual Appliance Host or its Windows client applications are deployed. Organizations relying on this print management solution may face local privilege escalation attacks that can lead to full system compromise. This can result in unauthorized modification of print configurations, injection of malicious code into system binaries, or disruption of printing services, which are often critical in enterprise environments. The ability to escalate privileges locally can also serve as a stepping stone for attackers to move laterally within networks or establish persistent footholds. Confidentiality may be compromised if attackers modify or access sensitive print jobs or configuration files. Integrity and availability of printing infrastructure and potentially other system components can be severely impacted. Given that many European enterprises and public sector organizations use centralized print management solutions, the vulnerability could disrupt business operations and lead to data breaches or compliance violations under regulations such as GDPR.

Mitigation Recommendations

European organizations should immediately verify their deployment of Vasion Print Virtual Appliance Host and associated Windows client applications. They must ensure that all affected versions are upgraded to at least version 25.1.102 for the appliance host and 25.1.1413 for the Windows client, or later versions where the vulnerability is patched. Until patching is confirmed, organizations should restrict local user access on systems running the vulnerable software to trusted personnel only, minimizing the risk of local exploitation. Implement strict file system permissions and monitor the temporary directories (C:\Users\%USER%\AppData\Local\Temp\) for suspicious symbolic links or unusual file creation patterns. Employ endpoint detection and response (EDR) tools to detect anomalous file operations or privilege escalation attempts. Additionally, consider application whitelisting to prevent unauthorized binary modifications. Conduct regular audits of print server configurations and binaries to detect unauthorized changes. Finally, educate system administrators and users about the risks of local privilege escalation and the importance of applying security updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a24b8a032c4fac76f2

Added to database: 9/19/2025, 6:53:22 PM

Last enriched: 9/30/2025, 12:15:12 AM

Last updated: 10/7/2025, 1:51:49 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats