CVE-2025-34235
29.09.2025, 21:15
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junctionpoint DLL injection.This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.Enginsight
| Vendor | Product | Version |
|---|---|---|
| vasion | virtual_appliance_application | 𝑥 < 25.1.1413 |
| vasion | virtual_appliance_host | 𝑥 < 25.1.102 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References