Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34197: CWE-798 Use of Hard-coded Credentials in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34197cvecve-2025-34197cwe-798
Published: Fri Sep 19 2025 (09/19/2025, 18:39:36 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951, Application prior to 20.0.2368 (VA and SaaS deployments) contain an undocumented local user account named ubuntu with a preset password and a sudoers entry granting that account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). Anyone who knows the hardcoded password can obtain root privileges via local console or equivalent administrative access, enabling local privilege escalation. This vulnerability has been identified by the vendor as: V-2024-010 — Hardcoded Linux Password. NOTE: The patch for this vulnerability is reported to be incomplete: /etc/shadow was remediated but /etc/sudoers remains vulnerable.

AI-Powered Analysis

AILast updated: 11/18/2025, 00:16:10 UTC

Technical Analysis

CVE-2025-34197 is a vulnerability categorized under CWE-798 (Use of Hard-coded Credentials) affecting Vasion Print Virtual Appliance Host and Application versions prior to 22.0.951 and 20.0.2368 respectively. The vulnerability arises from an undocumented local user account named 'ubuntu' embedded within the system with a preset password and a sudoers entry granting this account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). This configuration allows anyone with knowledge of the hardcoded password to gain root privileges via local console or equivalent administrative access, enabling local privilege escalation without requiring prior authentication or user interaction. The vendor identified this as V-2024-010 — Hardcoded Linux Password. Although a patch was released that remediated the /etc/shadow file to secure password storage, the /etc/sudoers file remains unpatched, leaving the sudoers configuration vulnerable and allowing continued privilege escalation. The vulnerability affects both Virtual Appliance (VA) and SaaS deployments, indicating a broad attack surface. The CVSS 4.0 score of 8.6 reflects a high severity due to the ease of exploitation (local access only), no authentication required, and the potential for full system compromise impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the presence of hardcoded credentials with root privileges presents a critical risk if discovered by attackers. The vulnerability does not require network access but does require local or equivalent administrative access, which could be gained through other means such as compromised credentials or physical access. This vulnerability is particularly dangerous in environments where multiple users share access or where local access controls are weak. The incomplete patching highlights the need for further vendor action and immediate attention from system administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for complete system compromise via local privilege escalation. Organizations relying on Vasion Print Virtual Appliance Host for print management, especially in sectors such as government, healthcare, finance, and critical infrastructure, could face data breaches, disruption of printing services, and lateral movement within networks. The ability to gain root access allows attackers to manipulate system configurations, install persistent malware, exfiltrate sensitive data, or disrupt operations. Given the appliance's role in print infrastructure, disruption could impact document workflows critical to business and regulatory compliance. The vulnerability's presence in both VA and SaaS deployments means cloud-hosted and on-premises environments are at risk, complicating incident response. European data protection regulations like GDPR increase the stakes, as exploitation leading to data breaches could result in heavy fines and reputational damage. The incomplete patch also means organizations cannot fully remediate the risk currently, necessitating interim compensating controls. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with weak physical or administrative access controls.

Mitigation Recommendations

1. Immediately audit all Vasion Print Virtual Appliance Host and Application deployments to identify affected versions and presence of the 'ubuntu' user account and sudoers entry. 2. Apply any vendor patches as soon as a complete fix is released, specifically ensuring both /etc/shadow and /etc/sudoers are properly secured. 3. Until a full patch is available, manually remove or disable the hardcoded 'ubuntu' account and remove its sudoers privileges, ensuring this does not disrupt appliance functionality. 4. Restrict physical and local console access to trusted personnel only, implementing strict access controls and monitoring. 5. Employ host-based intrusion detection systems (HIDS) to monitor for unauthorized use of the 'ubuntu' account or suspicious privilege escalation attempts. 6. Regularly review and harden sudoers configurations across all appliances to prevent passwordless root access. 7. Implement network segmentation to isolate print infrastructure from critical systems to limit lateral movement if compromise occurs. 8. Conduct user training and awareness to recognize and report suspicious local access activities. 9. Maintain up-to-date backups and incident response plans tailored to appliance compromise scenarios. 10. Engage with the vendor for updates and verify patch completeness before deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a34b8a032c4fac773b

Added to database: 9/19/2025, 6:53:23 PM

Last enriched: 11/18/2025, 12:16:10 AM

Last updated: 11/22/2025, 4:09:42 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats