Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31623 | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced. |
Tue, 18 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_host*:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Vasion virtual Appliance Host*
|
Mon, 17 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vasion virtual Appliance Host*
|
|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host*:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Vasion virtual Appliance Host*
|
Thu, 09 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Tue, 30 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Vasion Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
| Vendors & Products |
Microsoft
Microsoft windows Vasion Vasion virtual Appliance Application Vasion virtual Appliance Host |
Mon, 29 Sep 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced. | |
| Title | Vasion Print (formerly PrinterLogic) Weak SSL/TLS Certificate Validation RCE | |
| Weaknesses | CWE-295 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:15:38.083Z
Reserved: 2025-04-15T19:15:22.575Z
Link: CVE-2025-34235
Updated: 2025-09-30T15:04:54.656Z
Status : Analyzed
Published: 2025-09-29T21:15:37.620
Modified: 2025-10-09T17:55:21.890
Link: CVE-2025-34235
No data.
OpenCVE Enrichment
Updated: 2025-09-30T08:47:44Z
EUVD