CVE-2025-34235

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-09-29 21:15

Updated : 2025-10-09 17:55


NVD link : CVE-2025-34235

Mitre link : CVE-2025-34235

CVE.ORG link : CVE-2025-34235


JSON object : View

Products Affected

microsoft

  • windows

vasion

  • virtual_appliance_application
  • virtual_appliance_host
CWE
CWE-295

Improper Certificate Validation