Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34195: CWE-434 Unrestricted Upload of File with Dangerous Type in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34195cvecve-2025-34195cwe-434
Published: Fri Sep 19 2025 (09/19/2025, 18:38:11 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints. This vulnerability has been identified by the vendor as: V-2022-006 — Driver Upload Security.

AI-Powered Analysis

AILast updated: 11/24/2025, 15:20:10 UTC

Technical Analysis

CVE-2025-34195 is a remote code execution vulnerability identified in Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and the Windows client application versions prior to 20.0.1330. The vulnerability stems from the PrinterInstallerClient component launching programs using unquoted paths under "C:\Program Files (x86)\Printer Properties Pro\Printer Installer". Because the path is unquoted, Windows may mistakenly execute a malicious executable placed at a higher-priority short-path location such as "C:\Program.exe" instead of the intended legitimate binaries. An attacker who can place or cause a malicious executable to exist at such a location can achieve arbitrary code execution with the privileges of the installer process, which often runs with elevated rights. This can lead to privilege escalation and full system compromise of affected Windows endpoints. The vulnerability does not require user interaction or prior authentication, increasing its risk. The weakness is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that improper handling of file paths and executable uploads is the root cause. Although no public exploits have been reported yet, the vulnerability's CVSS 4.0 base score of 8.6 (high severity) reflects its significant impact and exploitability. The vulnerability is particularly dangerous in enterprise environments where Vasion Print solutions are deployed for centralized printer management and driver installation, as it can be leveraged to compromise critical infrastructure components.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Vasion Print solutions in enterprise and public sector environments for printer management. Successful exploitation can lead to complete compromise of affected Windows endpoints, enabling attackers to execute arbitrary code with elevated privileges, potentially leading to lateral movement, data exfiltration, or disruption of printing services critical to business operations. The lack of required authentication and user interaction increases the likelihood of exploitation in internal networks or via compromised user machines. This can undermine confidentiality, integrity, and availability of IT systems. Organizations in sectors such as government, finance, manufacturing, and healthcare that rely on centralized printing infrastructure are particularly vulnerable. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying its impact. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available to address the unquoted path issue in the PrinterInstallerClient component. 2. Until patches are released, restrict write permissions on the root of the system drive (e.g., C:\) to prevent unauthorized creation of executables like C:\Program.exe. 3. Implement application whitelisting to prevent execution of unauthorized binaries from unexpected locations. 4. Monitor file system activity for creation or modification of executables in short-path locations and unusual process launches originating from the PrinterInstallerClient directory. 5. Employ endpoint detection and response (EDR) solutions to detect and block suspicious activities related to driver installation processes. 6. Conduct network segmentation to limit exposure of critical printing infrastructure to untrusted networks or users. 7. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving printer management software compromise. 8. Regularly audit and harden permissions on directories involved in driver installation and printing services to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a34b8a032c4fac7735

Added to database: 9/19/2025, 6:53:23 PM

Last enriched: 11/24/2025, 3:20:10 PM

Last updated: 1/7/2026, 6:12:09 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats