Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise.
History

Wed, 24 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
CPEs cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 22 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Printerlogic
Printerlogic vasion Print
Printerlogic virtual Appliance
Vendors & Products Printerlogic
Printerlogic vasion Print
Printerlogic virtual Appliance

Fri, 19 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 19:00:00 +0000

Type Values Removed Values Added
Description Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise.
Title Vasion Print (formerly PrinterLogic) Arbitrary File Write as Root via Response Path Symlink Follow
Weaknesses CWE-276
CWE-59
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-09-19T18:51:42.645Z

Updated: 2025-09-20T03:55:44.294Z

Reserved: 2025-04-15T19:15:22.569Z

Link: CVE-2025-34191

cve-icon Vulnrichment

Updated: 2025-09-19T20:13:16.065Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-19T19:15:39.510

Modified: 2025-09-24T19:29:17.980

Link: CVE-2025-34191

cve-icon Redhat

No data.