Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34202: CWE-291 Reliance on IP Address for Authentication in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34202cvecve-2025-34202cwe-291
Published: Fri Sep 19 2025 (09/19/2025, 18:50:09 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 25.2.169 and Application prior to 25.2.1518 (VA and SaaS deployments) expose Docker internal networks in a way that allows an attacker on the same external L2 segment — or an attacker able to add routes using the appliance as a gateway — to reach container IPs directly. This grants access to internal services (HTTP APIs, Redis, MySQL, etc.) that are intended to be isolated inside the container network. Many of those services are accessible without authentication or are vulnerable to known exploitation chains. As a result, compromise of a single reachable endpoint or basic network access can enable lateral movement, remote code execution, data exfiltration, and full system compromise. This vulnerability has been identified by the vendor as: V-2025-003 — Insecure Access to Docker Instance from WAN.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:41:30 UTC

Technical Analysis

CVE-2025-34202 is a vulnerability in Vasion Print Virtual Appliance Host and Application (VA and SaaS deployments) prior to versions 25.2.169 and 25.2.1518. The issue arises because the appliance exposes Docker internal networks externally, permitting attackers on the same external Layer 2 network segment—or those able to add routes using the appliance as a gateway—to directly reach container IP addresses. This exposure bypasses intended network isolation, granting access to internal containerized services such as HTTP APIs, Redis, and MySQL. Many of these services either do not require authentication or are vulnerable to known exploitation techniques. The root cause is the reliance on IP address for authentication (CWE-291), which is inherently insecure in this scenario. Attackers exploiting this vulnerability can perform lateral movement within the network, execute remote code, exfiltrate sensitive data, and potentially achieve full system compromise. The CVSS 4.0 base score is 8.7 (high severity), reflecting the vulnerability's ease of exploitation (no authentication or user interaction required) and the high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability represents a critical risk to affected environments. The vendor has identified this as V-2025-003, describing it as insecure access to the Docker instance from WAN.

Potential Impact

The vulnerability allows attackers to bypass network isolation and directly access internal container services, many of which lack proper authentication. This can lead to unauthorized access to sensitive data stored in databases like MySQL, manipulation or disruption of services such as HTTP APIs and Redis, and execution of arbitrary code within the appliance environment. The ability to move laterally and escalate privileges increases the risk of full system compromise. For organizations, this could result in data breaches, operational disruption, loss of confidentiality and integrity of print management systems, and potential pivoting to other critical infrastructure. Given that the appliance may be deployed in enterprise environments managing print infrastructure, the impact extends to business continuity and compliance risks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat landscape significantly.

Mitigation Recommendations

Organizations should immediately upgrade Vasion Print Virtual Appliance Host and Application to versions 25.2.169 and 25.2.1518 or later, where this vulnerability is addressed. Until patches are applied, network segmentation should be enforced to isolate the appliance and its Docker networks from untrusted external Layer 2 segments. Restrict routing capabilities that allow attackers to use the appliance as a gateway to internal container IPs. Implement strict firewall rules to block unauthorized access to internal container services such as HTTP APIs, Redis, and MySQL. Monitor network traffic for unusual access patterns to Docker internal IP ranges. Additionally, review and harden authentication mechanisms for exposed services, ensuring no reliance on IP-based authentication. Employ network intrusion detection systems (NIDS) to detect lateral movement attempts. Finally, maintain up-to-date vulnerability scanning and incident response plans tailored to containerized environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.570Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cdaa094b8a032c4fac9ae7

Added to database: 9/19/2025, 7:07:53 PM

Last enriched: 2/27/2026, 1:41:30 AM

Last updated: 3/25/2026, 4:47:59 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses