CVE-2025-34195: CWE-434 Unrestricted Upload of File with Dangerous Type in Vasion Print Virtual Appliance Host
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints. This vulnerability has been identified by the vendor as: V-2022-006 — Driver Upload Security.
AI Analysis
Technical Summary
CVE-2025-34195 is a remote code execution vulnerability identified in Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and the Windows client application versions prior to 20.0.1330. The vulnerability stems from the PrinterInstallerClient component launching programs using unquoted paths under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, Windows may mistakenly execute a malicious executable placed at a higher-priority short-path location such as "C:\Program.exe" instead of the intended legitimate binaries. An attacker who can place or cause a malicious executable to exist at such a location can achieve arbitrary code execution with the privileges of the installer process, which often runs with elevated rights. This can lead to privilege escalation and full system compromise of affected Windows endpoints. The vulnerability does not require user interaction or prior authentication, increasing its risk. The weakness is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that improper handling of file paths and executable uploads is the root cause. Although no public exploits have been reported yet, the vulnerability's CVSS 4.0 base score of 8.6 (high severity) reflects its significant impact and exploitability. The vulnerability is particularly dangerous in enterprise environments where Vasion Print solutions are deployed for centralized printer management and driver installation, as it can be leveraged to compromise critical infrastructure components.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Vasion Print solutions in enterprise and public sector environments for printer management. Successful exploitation can lead to complete compromise of affected Windows endpoints, enabling attackers to execute arbitrary code with elevated privileges, potentially leading to lateral movement, data exfiltration, or disruption of printing services critical to business operations. The lack of required authentication and user interaction increases the likelihood of exploitation in internal networks or via compromised user machines. This can undermine confidentiality, integrity, and availability of IT systems. Organizations in sectors such as government, finance, manufacturing, and healthcare that rely on centralized printing infrastructure are particularly vulnerable. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying its impact. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
1. Apply vendor patches immediately once they become available to address the unquoted path issue in the PrinterInstallerClient component. 2. Until patches are released, restrict write permissions on the root of the system drive (e.g., C:\) to prevent unauthorized creation of executables like C:\Program.exe. 3. Implement application whitelisting to prevent execution of unauthorized binaries from unexpected locations. 4. Monitor file system activity for creation or modification of executables in short-path locations and unusual process launches originating from the PrinterInstallerClient directory. 5. Employ endpoint detection and response (EDR) solutions to detect and block suspicious activities related to driver installation processes. 6. Conduct network segmentation to limit exposure of critical printing infrastructure to untrusted networks or users. 7. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving printer management software compromise. 8. Regularly audit and harden permissions on directories involved in driver installation and printing services to minimize attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-34195: CWE-434 Unrestricted Upload of File with Dangerous Type in Vasion Print Virtual Appliance Host
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints. This vulnerability has been identified by the vendor as: V-2022-006 — Driver Upload Security.
AI-Powered Analysis
Technical Analysis
CVE-2025-34195 is a remote code execution vulnerability identified in Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and the Windows client application versions prior to 20.0.1330. The vulnerability stems from the PrinterInstallerClient component launching programs using unquoted paths under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, Windows may mistakenly execute a malicious executable placed at a higher-priority short-path location such as "C:\Program.exe" instead of the intended legitimate binaries. An attacker who can place or cause a malicious executable to exist at such a location can achieve arbitrary code execution with the privileges of the installer process, which often runs with elevated rights. This can lead to privilege escalation and full system compromise of affected Windows endpoints. The vulnerability does not require user interaction or prior authentication, increasing its risk. The weakness is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that improper handling of file paths and executable uploads is the root cause. Although no public exploits have been reported yet, the vulnerability's CVSS 4.0 base score of 8.6 (high severity) reflects its significant impact and exploitability. The vulnerability is particularly dangerous in enterprise environments where Vasion Print solutions are deployed for centralized printer management and driver installation, as it can be leveraged to compromise critical infrastructure components.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of Vasion Print solutions in enterprise and public sector environments for printer management. Successful exploitation can lead to complete compromise of affected Windows endpoints, enabling attackers to execute arbitrary code with elevated privileges, potentially leading to lateral movement, data exfiltration, or disruption of printing services critical to business operations. The lack of required authentication and user interaction increases the likelihood of exploitation in internal networks or via compromised user machines. This can undermine confidentiality, integrity, and availability of IT systems. Organizations in sectors such as government, finance, manufacturing, and healthcare that rely on centralized printing infrastructure are particularly vulnerable. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying its impact. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
1. Apply vendor patches immediately once they become available to address the unquoted path issue in the PrinterInstallerClient component. 2. Until patches are released, restrict write permissions on the root of the system drive (e.g., C:\) to prevent unauthorized creation of executables like C:\Program.exe. 3. Implement application whitelisting to prevent execution of unauthorized binaries from unexpected locations. 4. Monitor file system activity for creation or modification of executables in short-path locations and unusual process launches originating from the PrinterInstallerClient directory. 5. Employ endpoint detection and response (EDR) solutions to detect and block suspicious activities related to driver installation processes. 6. Conduct network segmentation to limit exposure of critical printing infrastructure to untrusted networks or users. 7. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving printer management software compromise. 8. Regularly audit and harden permissions on directories involved in driver installation and printing services to minimize attack surface.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.570Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cda6a34b8a032c4fac7735
Added to database: 9/19/2025, 6:53:23 PM
Last enriched: 11/24/2025, 3:20:10 PM
Last updated: 1/7/2026, 6:12:09 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.