CVE-2025-34199: CWE-319: Cleartext Transmission of Sensitive Information in Vasion Print Virtual Appliance Host
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1049 and Application versions prior to 20.0.2786 (VA and SaaS deployments) contain insecure defaults and code patterns that disable TLS/SSL certificate verification for communications to printers and internal microservices. In multiple places, the application sets libcurl/PHP transport options such that CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are effectively disabled, and environment variables (for example API_*_VERIFYSSL=false) are used to turn off verification for gateway and microservice endpoints. As a result, the client accepts TLS connections without validating server certificates (and, in some cases, uses clear-text HTTP), permitting on-path attackers to perform man-in-the-middle (MitM) attacks. An attacker able to intercept network traffic between the product and printers or microservices can eavesdrop on and modify sensitive data (including print jobs, configuration, and authentication tokens), inject malicious payloads, or disrupt service.
AI Analysis
Technical Summary
CVE-2025-34199 is a critical vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 22.0.1049 and Application versions prior to 20.0.2786, including both Virtual Appliance (VA) and SaaS deployments. The vulnerability arises from insecure default configurations and coding practices that disable TLS/SSL certificate verification during communications between the appliance and printers or internal microservices. Specifically, the application disables verification flags in libcurl and PHP transport layers by setting CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER to false, and environment variables such as API_*_VERIFYSSL=false are used to bypass SSL verification for gateway and microservice endpoints. This misconfiguration allows the client to accept TLS connections without validating server certificates, and in some cases, communications may even occur over unencrypted HTTP. Consequently, an attacker positioned on the network path between the appliance and printers or microservices can perform man-in-the-middle (MitM) attacks. Such an attacker can eavesdrop on sensitive information including print jobs, configuration data, and authentication tokens, modify or inject malicious payloads, or disrupt service availability. The CVSS v4.0 score of 9.3 (critical) reflects the high impact and ease of exploitation, as no authentication or user interaction is required, and the attack can be conducted remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of print infrastructure and the potential for lateral movement or data exfiltration within affected environments.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of print infrastructure and associated services. Many enterprises and public sector entities rely on Vasion Print solutions for centralized print management, making this a critical attack surface. Successful exploitation could lead to interception of sensitive documents, leakage of authentication credentials, and unauthorized manipulation of print jobs or configurations. This could result in data breaches, compliance violations (notably GDPR), operational disruptions, and reputational damage. Given the criticality of print services in sectors such as healthcare, finance, government, and manufacturing, exploitation could also facilitate further network compromise or espionage. The ability to inject malicious payloads or disrupt services could impact business continuity and trust in IT infrastructure. The vulnerability's exploitation does not require user interaction or credentials, increasing the likelihood of automated or opportunistic attacks in environments where network segmentation or encryption is insufficient.
Mitigation Recommendations
Organizations should immediately verify and update Vasion Print Virtual Appliance Host and Application versions to 22.0.1049 or later and 20.0.2786 or later respectively, where this vulnerability is addressed. In the absence of patches, administrators must audit and enforce strict TLS/SSL certificate verification settings by ensuring CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are enabled in all transport configurations. Environment variables that disable SSL verification (e.g., API_*_VERIFYSSL) must be removed or set to true. Network segmentation should be implemented to isolate print infrastructure from untrusted networks, minimizing exposure to MitM attacks. Deploying network-level encryption such as IPsec or VPN tunnels between print appliances and printers/microservices can provide additional protection. Continuous monitoring for anomalous network traffic and use of intrusion detection systems can help detect exploitation attempts. Organizations should also review and harden internal microservice communications and consider implementing certificate pinning where feasible. Finally, educating IT staff about the risks of disabling SSL verification and enforcing secure coding practices in custom integrations is essential to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2025-34199: CWE-319: Cleartext Transmission of Sensitive Information in Vasion Print Virtual Appliance Host
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1049 and Application versions prior to 20.0.2786 (VA and SaaS deployments) contain insecure defaults and code patterns that disable TLS/SSL certificate verification for communications to printers and internal microservices. In multiple places, the application sets libcurl/PHP transport options such that CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are effectively disabled, and environment variables (for example API_*_VERIFYSSL=false) are used to turn off verification for gateway and microservice endpoints. As a result, the client accepts TLS connections without validating server certificates (and, in some cases, uses clear-text HTTP), permitting on-path attackers to perform man-in-the-middle (MitM) attacks. An attacker able to intercept network traffic between the product and printers or microservices can eavesdrop on and modify sensitive data (including print jobs, configuration, and authentication tokens), inject malicious payloads, or disrupt service.
AI-Powered Analysis
Technical Analysis
CVE-2025-34199 is a critical vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 22.0.1049 and Application versions prior to 20.0.2786, including both Virtual Appliance (VA) and SaaS deployments. The vulnerability arises from insecure default configurations and coding practices that disable TLS/SSL certificate verification during communications between the appliance and printers or internal microservices. Specifically, the application disables verification flags in libcurl and PHP transport layers by setting CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER to false, and environment variables such as API_*_VERIFYSSL=false are used to bypass SSL verification for gateway and microservice endpoints. This misconfiguration allows the client to accept TLS connections without validating server certificates, and in some cases, communications may even occur over unencrypted HTTP. Consequently, an attacker positioned on the network path between the appliance and printers or microservices can perform man-in-the-middle (MitM) attacks. Such an attacker can eavesdrop on sensitive information including print jobs, configuration data, and authentication tokens, modify or inject malicious payloads, or disrupt service availability. The CVSS v4.0 score of 9.3 (critical) reflects the high impact and ease of exploitation, as no authentication or user interaction is required, and the attack can be conducted remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of print infrastructure and the potential for lateral movement or data exfiltration within affected environments.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of print infrastructure and associated services. Many enterprises and public sector entities rely on Vasion Print solutions for centralized print management, making this a critical attack surface. Successful exploitation could lead to interception of sensitive documents, leakage of authentication credentials, and unauthorized manipulation of print jobs or configurations. This could result in data breaches, compliance violations (notably GDPR), operational disruptions, and reputational damage. Given the criticality of print services in sectors such as healthcare, finance, government, and manufacturing, exploitation could also facilitate further network compromise or espionage. The ability to inject malicious payloads or disrupt services could impact business continuity and trust in IT infrastructure. The vulnerability's exploitation does not require user interaction or credentials, increasing the likelihood of automated or opportunistic attacks in environments where network segmentation or encryption is insufficient.
Mitigation Recommendations
Organizations should immediately verify and update Vasion Print Virtual Appliance Host and Application versions to 22.0.1049 or later and 20.0.2786 or later respectively, where this vulnerability is addressed. In the absence of patches, administrators must audit and enforce strict TLS/SSL certificate verification settings by ensuring CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are enabled in all transport configurations. Environment variables that disable SSL verification (e.g., API_*_VERIFYSSL) must be removed or set to true. Network segmentation should be implemented to isolate print infrastructure from untrusted networks, minimizing exposure to MitM attacks. Deploying network-level encryption such as IPsec or VPN tunnels between print appliances and printers/microservices can provide additional protection. Continuous monitoring for anomalous network traffic and use of intrusion detection systems can help detect exploitation attempts. Organizations should also review and harden internal microservice communications and consider implementing certificate pinning where feasible. Finally, educating IT staff about the risks of disabling SSL verification and enforcing secure coding practices in custom integrations is essential to prevent recurrence.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.570Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cda6a24b8a032c4fac76f8
Added to database: 9/19/2025, 6:53:22 PM
Last enriched: 9/19/2025, 7:10:00 PM
Last updated: 9/20/2025, 2:39:41 PM
Views: 20
Related Threats
CVE-2025-40925: CWE-340 Generation of Predictable Numbers or Identifiers in BLUEFEET Starch
HighCVE-2025-10741: Unrestricted Upload in Selleo Mentingo
MediumCVE-2025-9887: CWE-352 Cross-Site Request Forgery (CSRF) in bittokazi Custom Login And Signup Widget
MediumCVE-2025-9883: CWE-352 Cross-Site Request Forgery (CSRF) in bpedrassani Browser Sniff
MediumCVE-2025-9882: CWE-352 Cross-Site Request Forgery (CSRF) in michaelbo osTicket WP Bridge
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.