Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34199: CWE-319 Cleartext Transmission of Sensitive Information in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34199cvecve-2025-34199cwe-319
Published: Fri Sep 19 2025 (09/19/2025, 18:48:05 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1049 and Application versions prior to 20.0.2786 (VA and SaaS deployments) contain insecure defaults and code patterns that disable TLS/SSL certificate verification for communications to printers and internal microservices. In multiple places, the application sets libcurl/PHP transport options such that CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are effectively disabled, and environment variables (for example API_*_VERIFYSSL=false) are used to turn off verification for gateway and microservice endpoints. As a result, the client accepts TLS connections without validating server certificates (and, in some cases, uses clear-text HTTP), permitting on-path attackers to perform man-in-the-middle (MitM) attacks. An attacker able to intercept network traffic between the product and printers or microservices can eavesdrop on and modify sensitive data (including print jobs, configuration, and authentication tokens), inject malicious payloads, or disrupt service. This vulnerability has been identified by the vendor as: V-2024-024 — Insecure Communication to Printers & Microservices.

AI-Powered Analysis

AILast updated: 10/07/2025, 00:35:35 UTC

Technical Analysis

CVE-2025-34199 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host versions prior to 22.0.1049 and Application versions prior to 20.0.2786, including both virtual appliance and SaaS deployments. The root cause is insecure default configurations and coding practices that disable TLS/SSL certificate verification during communications with printers and internal microservices. Specifically, the application sets libcurl and PHP transport options such that CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are disabled, and environment variables like API_*_VERIFYSSL=false are used to bypass SSL verification for gateway and microservice endpoints. Consequently, the client accepts TLS connections without validating server certificates, and in some cases, communications occur over clear-text HTTP. This allows an attacker positioned on the network path between the Vasion Print host and printers or microservices to perform man-in-the-middle (MitM) attacks. Such an attacker can intercept and read sensitive data including print jobs, configuration parameters, and authentication tokens, modify or inject malicious payloads, or disrupt printing services. The vulnerability does not require any authentication or user interaction, making it trivially exploitable in environments where network traffic can be intercepted. The CVSS 4.0 base score of 9.3 reflects the criticality due to network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to organizations using affected Vasion Print versions. The vendor has identified this issue as V-2024-024 and it is categorized under CWE-319 (Cleartext Transmission of Sensitive Information).

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of printing infrastructure and related services. Many enterprises and public sector organizations rely on centralized print management solutions like Vasion Print to handle sensitive documents. Exploitation could lead to unauthorized disclosure of confidential print jobs, including personal data protected under GDPR, intellectual property, or sensitive internal communications. Attackers could also manipulate print jobs or configurations, potentially causing operational disruptions or injecting malicious content. The ability to intercept authentication tokens further risks lateral movement or privilege escalation within internal networks. Given the critical nature of printing services in sectors such as healthcare, finance, government, and manufacturing, disruption or data leakage could have significant operational and reputational consequences. Additionally, the vulnerability’s ease of exploitation without authentication or user interaction increases the threat level, especially in environments with insufficient network segmentation or monitoring. European organizations with remote or hybrid workforces using SaaS deployments may also face increased exposure if network traffic is not adequately secured.

Mitigation Recommendations

1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and Application versions to 20.0.2786 or later once patches are released by the vendor. 2. Until patches are applied, enforce network segmentation to isolate printing infrastructure from untrusted networks and restrict access to trusted hosts only. 3. Implement network-level encryption and integrity controls such as IPsec or VPN tunnels to protect communications between Vasion Print hosts, printers, and microservices. 4. Conduct thorough network traffic monitoring and anomaly detection to identify potential MitM attempts or unusual print job modifications. 5. Review and disable any environment variables or configuration settings that disable SSL/TLS verification (e.g., API_*_VERIFYSSL=false). 6. Where possible, enforce strict TLS certificate validation policies on all components interacting with printers and microservices. 7. Educate IT and security teams about the risks of disabling SSL verification and the importance of secure transport configurations. 8. Perform regular audits of printing infrastructure configurations and update security policies to prevent insecure defaults. 9. Consider deploying endpoint detection and response (EDR) solutions on print servers to detect suspicious activities. 10. Coordinate with vendors and service providers to ensure timely vulnerability management and incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a24b8a032c4fac76f8

Added to database: 9/19/2025, 6:53:22 PM

Last enriched: 10/7/2025, 12:35:35 AM

Last updated: 11/3/2025, 11:33:14 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats