Printix Secure Cloud Print Management through 1.3.1106.0 incorrectly uses Privileged APIs to modify values in HKEY_LOCAL_MACHINE via UITasks.PersistentRegistryData.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://printix.com | broken link |
https://www.exploit-db.com/exploits/50798 | exploit vdb entry third party advisory |
https://github.com/ComparedArray/printix-CVE-2022-25089 | third party advisory |
http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html | vdb entry third party advisory |