Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34212: CWE-494 Download of Code Without Integrity Check in Vasion Print Virtual Appliance Host

0
High
VulnerabilityCVE-2025-34212cvecve-2025-34212cwe-494cwe-732
Published: Mon Sep 29 2025 (09/29/2025, 20:36:51 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.843 and Application prior to version 20.0.1923 (VA/SaaS deployments) possess CI/CD weaknesses: the build pulls an unverified third-party image, downloads the VirtualBox Extension Pack over plain HTTP without signature validation, and grants the jenkins account NOPASSWD for mount/umount. Together these allow supply chain or man-in-the-middle compromise of the build pipeline, injection of malicious firmware, and remote code execution as root on the CI host. This vulnerability has been identified by the vendor as: V-2023-007 — Supply Chain Attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:42:08 UTC

Technical Analysis

CVE-2025-34212 affects Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application versions prior to 20.0.1923 in VA/SaaS deployments. The vulnerability stems from multiple CI/CD security weaknesses: the build process pulls an unverified third-party container image, downloads the VirtualBox Extension Pack over unencrypted HTTP without validating its digital signature, and grants the Jenkins automation account passwordless sudo privileges specifically for mount and umount commands. These combined flaws allow attackers positioned in the supply chain or capable of man-in-the-middle (MitM) attacks to compromise the build pipeline. By injecting malicious firmware or code during the build, an attacker can achieve remote code execution with root privileges on the continuous integration host. This compromises the integrity of the build environment and any software produced, potentially leading to widespread downstream compromise. The vulnerability is categorized under CWE-494 (Download of Code Without Integrity Check) and CWE-732 (Incorrect Permission Assignment for Critical Resource). The CVSS v4.0 base score is 8.7 (high severity), reflecting network attack vector, no required privileges or user interaction, and high impact on integrity. The vendor has identified this as a supply chain attack vector (V-2023-007). No patches or exploits are currently publicly available, but the risk remains substantial due to the critical nature of the build environment and root-level access achievable by attackers.

Potential Impact

The impact of CVE-2025-34212 is severe for organizations relying on Vasion Print Virtual Appliance Host and Application in their print management infrastructure. Successful exploitation can lead to full compromise of the CI/CD build environment, allowing attackers to inject malicious code or firmware into software builds. This undermines the integrity of the software supply chain, potentially distributing compromised software to numerous downstream systems. Remote code execution as root on the CI host enables attackers to control build processes, exfiltrate sensitive data, or pivot to other internal systems. This can result in operational disruption, data breaches, and loss of trust in software integrity. Organizations with automated build pipelines and those deploying in VA/SaaS environments are particularly vulnerable. The lack of authentication and user interaction requirements increases the ease of exploitation. Although no known exploits are currently reported, the vulnerability presents a significant risk for supply chain attacks, which have historically caused widespread damage. The potential for cascading effects across multiple organizations using affected software amplifies the threat.

Mitigation Recommendations

To mitigate CVE-2025-34212, organizations should take the following specific actions: 1) Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.843 or later and the Application to version 20.0.1923 or later once patches are released by the vendor. 2) Until patches are available, restrict network access to the CI/CD build environment to trusted sources only and monitor for unusual activity. 3) Modify the CI/CD pipeline to enforce integrity checks on all downloaded components, including verifying digital signatures or hashes of third-party images and VirtualBox Extension Packs. 4) Replace HTTP downloads with HTTPS or other secure transport protocols to prevent MitM attacks. 5) Remove or restrict the Jenkins account's NOPASSWD sudo permissions for mount/umount commands, applying the principle of least privilege. 6) Implement runtime monitoring and alerting for unauthorized changes or suspicious processes on the CI host. 7) Conduct a thorough audit of the build environment and supply chain to identify any signs of compromise. 8) Educate development and operations teams about supply chain security best practices and the risks of unverified code downloads. These targeted measures go beyond generic advice by focusing on the specific weaknesses exploited in this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5cc

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 2/27/2026, 1:42:08 AM

Last updated: 3/25/2026, 4:47:19 AM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses