Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34192: CWE-1104: Use of Unmaintained Third Party Components in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34192cvecve-2025-34192cwe-1104
Published: Fri Sep 19 2025 (09/19/2025, 18:39:01 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.893 and Application versions prior to 20.0.2140 (macOS/Linux client deployments) are built against OpenSSL 1.0.2h-fips (released May 2016), which has been end-of-life since 2019 and is no longer supported by the OpenSSL project. Continued use of this outdated cryptographic library exposes deployments to known vulnerabilities that are no longer patched, weakening the overall security posture. Affected daemons may emit deprecation warnings and rely on cryptographic components with unresolved security flaws, potentially enabling attackers to exploit weaknesses in TLS/SSL processing or cryptographic operations. This vulnerability has been identified by the vendor as: V-2023-021 — Out-of-Date OpenSSL Library.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:11:16 UTC

Technical Analysis

CVE-2025-34192 identifies a critical vulnerability in the Vasion Print Virtual Appliance Host and its associated macOS/Linux client deployments. The root cause is the use of an outdated and unmaintained third-party cryptographic library, OpenSSL version 1.0.2h-fips, which was released in May 2016 and reached end-of-life status in 2019. Since then, OpenSSL 1.0.2h-fips has not received security patches, leaving known vulnerabilities unaddressed. This outdated library is embedded in Vasion Print Virtual Appliance Host versions prior to 22.0.893 and application versions prior to 20.0.2140. The continued reliance on this legacy cryptographic component exposes the appliance to multiple risks, including exploitation of weaknesses in TLS/SSL processing and cryptographic operations. Potential attack vectors include interception or manipulation of encrypted communications, downgrade attacks, or exploitation of cryptographic flaws that could compromise confidentiality, integrity, and availability of print services. The vulnerability is classified under CWE-1104, which concerns the use of unmaintained third-party components, a common supply chain risk. The CVSS 4.0 score of 9.3 (critical) reflects the high impact and ease of exploitation, with no authentication or user interaction required, and full network attack vector. Although no known exploits are currently in the wild, the severity and nature of the vulnerability necessitate urgent remediation. The vendor has identified this as V-2023-021 and recommends upgrading to versions that use a maintained OpenSSL library. Failure to patch could allow attackers to compromise print infrastructure, potentially leading to data leakage, service disruption, or lateral movement within affected environments.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially in sectors relying heavily on secure print services such as government, finance, healthcare, and critical infrastructure. Exploitation could lead to interception of sensitive documents, unauthorized access to print queues, or disruption of printing services, impacting operational continuity. Given the appliance’s role in managing print workflows, attackers could leverage this weakness to infiltrate internal networks, escalate privileges, or exfiltrate confidential data. The critical CVSS score indicates a high likelihood of severe impact on confidentiality, integrity, and availability. Organizations with compliance obligations under GDPR and other data protection regulations may face legal and reputational consequences if sensitive information is compromised. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the threat landscape. The vulnerability also undermines trust in cryptographic protections, which are foundational for secure communications within enterprise environments.

Mitigation Recommendations

European organizations should prioritize upgrading Vasion Print Virtual Appliance Host to version 22.0.893 or later and application versions to 20.0.2140 or newer, which incorporate updated and supported OpenSSL libraries. If immediate upgrades are not feasible, organizations should implement network segmentation to isolate print appliances from critical systems and restrict access to trusted management networks only. Employing network-level controls such as firewalls and intrusion detection/prevention systems can help detect and block anomalous traffic targeting the print infrastructure. Regularly auditing cryptographic configurations and monitoring for deprecated protocols or cipher suites is essential to reduce exposure. Organizations should also engage with Vasion support for any available interim patches or workarounds. Additionally, integrating print appliance monitoring into centralized security information and event management (SIEM) systems can enhance detection of suspicious activities. Finally, organizations should review and update incident response plans to address potential exploitation scenarios involving print infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a34b8a032c4fac772f

Added to database: 9/19/2025, 6:53:23 PM

Last enriched: 10/3/2025, 12:11:16 AM

Last updated: 10/7/2025, 11:20:07 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats