Логотип exploitDog
bind:CVE-2025-34235
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34235

Количество 3

Количество 3

nvd логотип

CVE-2025-34235

4 месяца назад

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-h65j-9j8p-pprc

4 месяца назад

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2026-00258

4 месяца назад

Уязвимость программного обеспечения для управления, контроля и организации процессов печати Vasion Print Virtual Appliance Host и Print Application, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34235

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

CVSS3: 7.8
0%
Низкий
4 месяца назад
github логотип
GHSA-h65j-9j8p-pprc

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

CVSS3: 7.8
0%
Низкий
4 месяца назад
fstec логотип
BDU:2026-00258

Уязвимость программного обеспечения для управления, контроля и организации процессов печати Vasion Print Virtual Appliance Host и Print Application, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии

CVSS3: 9.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу