CVE-2025-34189
BaseFortify
Publication date: 2025-09-19
Last updated on: 2025-10-02
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| vasion | virtual_appliance_application | to 20.0.1330 (exc) |
| vasion | virtual_appliance_host | to 1.0.735 (exc) |
| apple | macos | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
| CWE-922 | The product stores sensitive information without properly limiting read or write access by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Vasion Print (formerly PrinterLogic) involves insecure inter-process communication (IPC) where request and response files are stored with world-readable and world-writable permissions. This allows any local user to create malicious request files that privileged daemons process, leading to unauthorized actions in other user sessions. Essentially, it breaks user session isolation and enables local attackers to hijack sessions and perform actions as other users. [1]
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a local attacker to hijack user sessions and execute unauthorized actions in the context of other users. This compromises system integrity and availability, potentially leading to privilege escalation and unauthorized access to sensitive operations within the affected system. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the permissions of the IPC request and response files located in /opt/PrinterInstallerClient/tmp. Specifically, look for files with world-readable and world-writable permissions. For example, on a Linux or macOS system, you can run the command: ls -l /opt/PrinterInstallerClient/tmp to list the permissions of the files in that directory and identify insecure permission settings. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting the permissions of the IPC files in /opt/PrinterInstallerClient/tmp to prevent world-readable and world-writable access. This can be done by changing the permissions to allow access only to the necessary users or processes. Additionally, upgrading Vasion Print Virtual Appliance Host to version 1.0.735 or later, or the Application to version 20.0.1330 or later, will address the vulnerability as these versions contain the fix. [1]