Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34196: CWE-798 Use of Hard-coded Credentials in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34196cvecve-2025-34196cwe-798cwe-522
Published: Mon Sep 29 2025 (09/29/2025, 19:11:16 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product's network communications. This vulnerability has been identified by the vendor as: V-2022-001 — Configuration File Contains CA & Private Key.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:41:18 UTC

Technical Analysis

CVE-2025-34196 is a severe security vulnerability affecting Vasion Print Virtual Appliance Host versions prior to 25.1.102 and Windows client deployments prior to 25.1.1413. The core issue is the presence of hardcoded private keys and passwords within shipped configuration files, specifically the PrinterLogic Certificate Authority (CA) private key and associated credentials embedded in files like clientsettings.dat and defaults.ini. This violates secure coding practices (CWE-798) and leads to exposure of sensitive cryptographic material. Because the Windows client trusts certificates signed by this CA, an attacker who gains access to these configuration files can impersonate the CA, generate arbitrary trusted certificates, and conduct man-in-the-middle (MITM) attacks. This enables interception, decryption, and manipulation of TLS-protected communications between clients and servers. The vulnerability requires no authentication or user interaction and can be exploited remotely, making it highly dangerous. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:H) reflects network attackability with low complexity and no privileges needed, impacting confidentiality, integrity, and availability severely. Although no exploits have been reported in the wild yet, the presence of hardcoded credentials in widely deployed enterprise printing infrastructure presents a significant risk. The vendor has identified this as V-2022-001 but has not yet provided patches, emphasizing the need for immediate mitigation.

Potential Impact

This vulnerability poses a critical risk to organizations using Vasion Print Virtual Appliance Host and its Windows client. By compromising the hardcoded private keys and passwords, attackers can impersonate the trusted CA, enabling them to sign malicious certificates that clients will accept as valid. This undermines the trust model of TLS communications, allowing attackers to intercept, decrypt, and manipulate sensitive data transmitted over the network. Potential impacts include exposure of confidential print jobs, credential theft, lateral movement within networks, and disruption of printing services. The ability to perform man-in-the-middle attacks without authentication or user interaction increases the likelihood of successful exploitation. Given the widespread use of printing infrastructure in enterprises, this vulnerability could facilitate espionage, data leakage, and operational disruption across multiple sectors. The critical CVSS score reflects the high severity and broad impact scope. Organizations with remote or distributed printing environments are especially vulnerable, as attackers can exploit this remotely over the network.

Mitigation Recommendations

Organizations should immediately audit their deployments of Vasion Print Virtual Appliance Host and Windows clients to identify affected versions. Until official patches are released, administrators should: 1) Remove or restrict access to configuration files containing hardcoded credentials to trusted personnel only, using strict file system permissions and network segmentation. 2) Rotate or replace any exposed private keys and passwords if possible, generating new cryptographic material and updating client configurations accordingly. 3) Employ network-level protections such as TLS interception detection, certificate pinning, or mutual TLS to detect unauthorized certificates. 4) Monitor network traffic for anomalous TLS certificates or suspicious man-in-the-middle activity. 5) Limit exposure of printing infrastructure to untrusted networks by using VPNs or firewalls. 6) Engage with the vendor for timely patch updates and apply them promptly once available. 7) Consider deploying endpoint detection and response (EDR) solutions to identify exploitation attempts. These steps go beyond generic advice by focusing on credential management, network controls, and active monitoring tailored to this vulnerability’s specifics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dada9fcf5ae426d225ee00

Added to database: 9/29/2025, 7:14:39 PM

Last enriched: 2/27/2026, 1:41:18 AM

Last updated: 3/28/2026, 3:48:00 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses