CVE-2025-34193
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-19

Last updated on: 2025-09-29

Assigner: VulnCheck

Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives β€” for example from crafted driver content or maliciously crafted inputs β€” can be turned into remote or local code execution and privilege escalation to SYSTEM.Β This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-19
Last Modified
2025-09-29
Generated
2026-05-07
AI Q&A
2025-09-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
vasion virtual_appliance_application *
vasion virtual_appliance_host *
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1104 The product relies on third-party components that are not actively supported or maintained by the original developer or a trusted proxy for the original developer.
CWE-755 The product does not handle or incorrectly handles an exceptional condition.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Vasion Print (formerly PrinterLogic) Windows client components that are built without modern security protections such as DEP, ASLR, CFG, or stack-protection and rely on outdated runtimes like Pascal/Delphi and Python 2. Some of these components run with SYSTEM privileges and automatically download and install printer drivers. Due to the lack of memory safety mitigations and use of unmaintained runtimes, attackers can exploit memory corruption or crafted inputs to achieve remote or local code execution and escalate privileges to SYSTEM. [1]


How can this vulnerability impact me? :

The vulnerability can lead to remote or local code execution and privilege escalation to SYSTEM level on affected systems. This means an attacker could potentially execute arbitrary code with the highest system privileges, compromising system integrity and availability. The impact includes high integrity and availability risks, although confidentiality impact is low. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on identifying the presence of the vulnerable Windows client components: PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, and PrinterInstallerClientLauncher.exe. You can use commands to list running processes or installed files matching these names. For example, on Windows systems, use PowerShell commands like 'Get-Process -Name PrinterInstallerClient*' to check running processes or 'Get-ChildItem -Path "C:\Program Files\" -Recurse -Include PrinterInstallerClient*.exe' to find installed binaries. Additionally, monitoring for unexpected printer driver downloads or installations may indicate exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to systems running the vulnerable components to trusted users only, disabling or limiting the automatic printer driver download and installation feature if possible, and monitoring for suspicious activity related to these processes. Since it is currently unknown whether a patch exists, consider isolating affected systems or applying application whitelisting to prevent execution of the vulnerable binaries. Additionally, ensure that systems have up-to-date security controls and consider compensating controls to reduce the risk of exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart