Browse all 43 CVE security advisories affecting Vasion. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Vasion operates as a provider of virtual desktop infrastructure (VDI) and desktop virtualization solutions, enabling organizations to deploy remote computing environments. Security audits have identified forty-three Common Vulnerabilities and Exposures (CVEs) associated with its software ecosystem, highlighting significant historical security debt. The majority of these flaws involve remote code execution and cross-site scripting, which allow attackers to compromise system integrity or steal user data without authentication. Additionally, several instances of privilege escalation have been documented, permitting unauthorized users to gain administrative control over virtualized endpoints. While specific major public breaches directly attributed to Vasion are not widely reported in mainstream incident databases, the high volume of unpatched vulnerabilities suggests inconsistent security maintenance practices. These technical weaknesses pose substantial risks to enterprises relying on its platform for sensitive data processing, necessitating rigorous network segmentation and immediate patching strategies to mitigate potential exploitation vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-34190 | Vasion Print (formerly PrinterLogic) PrinterInstallerClientService Authentication Bypass via LD_PRELOAD Hooking — Print ApplicationCWE-306 | 6.7 | - | 2025-09-19 |
This page lists every published CVE security advisory associated with Vasion. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.