Skip to main content

CVE-2025-34212: CWE-494 Download of Code Without Integrity Check in Vasion Print Virtual Appliance Host

High
VulnerabilityCVE-2025-34212cvecve-2025-34212cwe-494cwe-732
Published: Mon Sep 29 2025 (09/29/2025, 20:36:51 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.843 and Application prior to version 20.0.1923 (VA/SaaS deployments) possess CI/CD weaknesses: the build pulls an unverified third-party image, downloads the VirtualBox Extension Pack over plain HTTP without signature validation, and grants the jenkins account NOPASSWD for mount/umount. Together these allow supply chain or man-in-the-middle compromise of the build pipeline, injection of malicious firmware, and remote code execution as root on the CI host. This vulnerability has been identified by the vendor as: V-2023-007 — Supply Chain Attack.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:48:12 UTC

Technical Analysis

CVE-2025-34212 is a high-severity vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 22.0.843 and Application versions prior to 20.0.1923 in VA/SaaS deployments. The vulnerability stems from insecure CI/CD pipeline practices, including the use of unverified third-party images, downloading the VirtualBox Extension Pack over unencrypted HTTP without signature validation, and granting the Jenkins automation account passwordless sudo privileges specifically for mount and umount commands. These weaknesses collectively enable an attacker to perform a supply chain or man-in-the-middle (MitM) attack on the build pipeline. By intercepting or injecting malicious content during the build process, an adversary can introduce malicious firmware or code, leading to remote code execution with root privileges on the continuous integration (CI) host. This compromises the integrity of the build environment and potentially all downstream deployments relying on these builds. The vulnerability is categorized under CWE-494 (Download of Code Without Integrity Check) and CWE-732 (Incorrect Permission Assignment for Critical Resource), highlighting both the lack of code authenticity verification and overly permissive access controls. The CVSS 4.0 base score is 8.7, reflecting network exploitability without authentication or user interaction, and a high impact on system integrity. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a prime target for sophisticated supply chain attacks, which can have widespread and persistent effects.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those relying on Vasion Print Virtual Appliance Host for print management and related services. Successful exploitation could lead to full compromise of the CI build environment, enabling attackers to inject malicious code that propagates through software deployments. This can result in unauthorized access, data breaches, disruption of printing services, and potential lateral movement within corporate networks. Given the root-level execution capability, attackers could disable security controls, exfiltrate sensitive information, or deploy ransomware. The supply chain nature amplifies the risk, as compromised builds may affect multiple organizations downstream, making detection and remediation more challenging. Industries with critical printing infrastructure, such as government, healthcare, finance, and manufacturing sectors in Europe, could face operational disruptions and regulatory consequences under GDPR and other data protection laws if sensitive data is exposed or services interrupted.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate upgrade to Vasion Print Virtual Appliance Host version 22.0.843 or later and Application version 20.0.1923 or later, where the vendor has presumably addressed these CI/CD weaknesses. 2) Implement strict integrity checks on all third-party images and software components used in the build pipeline, including cryptographic signature verification and use of secure transport protocols (e.g., HTTPS with certificate validation) to prevent MitM attacks. 3) Remove or restrict the Jenkins account’s sudo privileges, limiting it to only necessary commands with proper authentication and auditing to prevent privilege escalation. 4) Harden the CI/CD environment by isolating build servers, enforcing network segmentation, and monitoring for anomalous activities indicative of supply chain compromise. 5) Conduct regular security audits of the build pipeline and dependency sources to detect unauthorized changes or suspicious downloads. 6) Employ runtime protection and endpoint detection on CI hosts to quickly identify and respond to exploitation attempts. 7) Establish incident response plans specifically addressing supply chain attacks to minimize impact and recovery time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5cc

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 9/29/2025, 8:48:12 PM

Last updated: 10/3/2025, 7:41:03 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats