Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34200: CWE-312 Cleartext Storage of Sensitive Information in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34200cvecve-2025-34200cwe-312
Published: Fri Sep 19 2025 (09/19/2025, 18:45:41 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment.

AI-Powered Analysis

AILast updated: 11/18/2025, 00:16:34 UTC

Technical Analysis

CVE-2025-34200 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. The Vasion Print Virtual Appliance Host and Application, including both Virtual Appliance (VA) and Software as a Service (SaaS) deployments, provision network account credentials in plaintext within the /etc/issue file. This file is world-readable by default, meaning any user with local shell access can read it without elevated privileges. The exposed credentials include the username and password for the network account used by the appliance. With these credentials, an attacker can access the appliance's network configuration interface and modify network parameters. Such modifications can cause local misconfiguration, disrupt network operations, or enable further privilege escalation depending on the environment and deployment specifics. The vulnerability affects all versions of the product, indicating a systemic issue in how credentials are handled. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) indicates that the attack requires local access but no authentication or user interaction, with high impact on confidentiality and integrity, and low impact on availability. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Vasion Print Virtual Appliance Hosts are deployed in shared or multi-user systems where local shell access might be possible for untrusted users or attackers. The exposure of network account credentials in cleartext can lead to unauthorized changes in network configurations, potentially causing network outages, misrouting, or enabling lateral movement within the network. This can disrupt printing services critical to business operations and may also serve as a foothold for further attacks targeting network infrastructure. Organizations with strict data protection regulations, such as GDPR, may face compliance risks if sensitive network credentials are compromised. Additionally, sectors with high dependency on secure printing and network reliability, such as government, healthcare, and finance, could experience operational and reputational damage. The lack of authentication or user interaction required for exploitation increases the urgency for mitigation.

Mitigation Recommendations

Immediate mitigation steps include restricting local shell access to trusted administrators only and auditing current access controls on systems running Vasion Print Virtual Appliance Hosts. Organizations should implement strict file permissions on /etc/issue to prevent world-readable access, ideally limiting it to root or the appliance service account. Network segmentation should be employed to isolate printing appliances from general user environments to reduce the risk of local access by unauthorized users. Monitoring and alerting for unusual changes in network configurations on the appliance can help detect exploitation attempts early. Until a vendor patch is available, consider deploying compensating controls such as credential rotation for the network account and using multi-factor authentication where possible for network management interfaces. Engage with Vasion support to obtain updates on patches or official remediation guidance. Finally, conduct regular security assessments and penetration tests focusing on local privilege escalation and credential exposure risks in appliance environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cda6a24b8a032c4fac76fe

Added to database: 9/19/2025, 6:53:22 PM

Last enriched: 11/18/2025, 12:16:34 AM

Last updated: 11/22/2025, 4:23:24 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats