Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Problem types
CWE-295 Improper Certificate Validation
Product status
* before 25.1.102
* before 25.1.1413
Credits
Pierre Barre
References
pierrekim.github.io/...-printerlogic-83-vulnerabilities.html
help.printerlogic.com/...int/Security/Security-Bulletins.htm
help.printerlogic.com/...int/Security/Security-Bulletins.htm
www.vulncheck.com/...weak-ssl-tls-certificate-validation-rce