Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34208: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34208cvecve-2025-34208cwe-327cwe-759
Published: Thu Oct 02 2025 (10/02/2025, 16:13:06 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store user passwords using unsalted SHA-512 hashes with a fall-back to unsalted SHA-1. The hashing is performed via PHP's `hash()` function in multiple files (server_write_requests_users.php, update_database.php, legacy/Login.php, tests/Unit/Api/IdpControllerTest.php). No per-user salt is used and the fast hash algorithms are unsuitable for password storage. An attacker who obtains the password database can recover cleartext passwords via offline dictionary or rainbow table attacks. The vulnerable code also contains logic that migrates legacy SHA-1 hashes to SHA-512 on login, further exposing users still on the old hash. This vulnerability was partially resolved, but still present within the legacy authentication platform.

AI-Powered Analysis

AILast updated: 11/24/2025, 13:09:14 UTC

Technical Analysis

CVE-2025-34208 identifies a cryptographic weakness in the Vasion Print Virtual Appliance Host and Application, formerly known as PrinterLogic, which is used in VA/SaaS deployments. The vulnerability arises from the use of unsalted SHA-512 hashing for storing user passwords, with a fallback to unsalted SHA-1 hashes. These hashes are generated using PHP's `hash()` function in multiple source files, including server_write_requests_users.php, update_database.php, legacy/Login.php, and test files. The absence of per-user salts and the use of fast hashing algorithms unsuitable for password storage make the stored password hashes vulnerable to offline attacks such as dictionary and rainbow table attacks. Additionally, the legacy authentication platform contains logic that migrates legacy SHA-1 hashes to SHA-512 upon user login, which inadvertently exposes users still relying on the weaker SHA-1 hashes. This migration process does not add salting or slow hashing, thus preserving the vulnerability. The vulnerability affects all versions of the product and requires no privileges or user interaction to exploit. An attacker who gains access to the password database can efficiently recover plaintext passwords, compromising user accounts and potentially escalating access within affected environments. Although no public exploits are currently known, the CVSS 4.0 score of 8.2 reflects the high impact on confidentiality and the ease of exploitation due to network accessibility and lack of authentication requirements. The vulnerability is classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-759 (Use of a One-Way Hash without a Salt).

Potential Impact

For European organizations, the impact of CVE-2025-34208 is significant due to the potential compromise of user credentials stored within Vasion Print Virtual Appliance Hosts. Successful exploitation allows attackers to recover plaintext passwords from stolen password databases, leading to unauthorized access to printing infrastructure and potentially other integrated systems if password reuse occurs. This can result in data leakage, disruption of printing services, and lateral movement within corporate networks. Given that printing services are often integrated with enterprise authentication and document workflows, compromised credentials could facilitate further attacks, including data exfiltration or sabotage. The vulnerability's presence in legacy authentication code means organizations that have not fully migrated to updated platforms remain at risk. The lack of user interaction or authentication requirements for exploitation increases the threat level. European organizations with compliance obligations under GDPR may face regulatory consequences if user data confidentiality is breached due to this vulnerability. The risk is exacerbated in sectors with high printing demands such as manufacturing, government, and finance, where printing infrastructure is critical to operations.

Mitigation Recommendations

Organizations should immediately audit their deployments of Vasion Print Virtual Appliance Host and Application to identify affected versions. They must prioritize upgrading or patching to versions that eliminate the use of unsalted SHA-512 and SHA-1 hashes for password storage. If patches are unavailable, organizations should implement compensating controls such as enforcing password resets for all users and migrating to a secure password hashing scheme using modern algorithms like bcrypt, scrypt, or Argon2 with unique per-user salts and appropriate work factors. Review and refactor legacy authentication code to remove fallback to SHA-1 and ensure all password hashes are salted and slow-hashed. Limit access to password databases and logs to reduce the risk of data exfiltration. Monitor for unusual access patterns or authentication anomalies that may indicate exploitation attempts. Additionally, implement network segmentation and strict access controls around printing infrastructure to contain potential breaches. Conduct user awareness training to discourage password reuse across systems. Finally, maintain an incident response plan tailored to credential compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dea7707d138d8f7b8e83a3

Added to database: 10/2/2025, 4:25:20 PM

Last enriched: 11/24/2025, 1:09:14 PM

Last updated: 1/7/2026, 6:11:50 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats