Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34216: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34216cvecve-2025-34216cwe-306cwe-312
Published: Mon Sep 29 2025 (09/29/2025, 20:39:13 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (VA deployments only) expose a set of unauthenticated REST API endpoints that return configuration files and clear‑text passwords. The same endpoints also disclose the Laravel APP_KEY used for cryptographic signing. Because the APP_KEY is required to generate valid signed requests, an attacker who obtains it can craft malicious payloads that are accepted by the application and achieve remote code execution on the appliance. This vulnerability has been identified by the vendor as: V-2024-018 — RCE & Leaks via API.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:47:11 UTC

Technical Analysis

CVE-2025-34216 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host versions prior to 22.0.1026 and Application versions prior to 20.0.2702 (VA deployments only). The vulnerability arises from unauthenticated REST API endpoints that expose sensitive configuration files and clear-text passwords. Additionally, these endpoints disclose the Laravel APP_KEY, which is used for cryptographic signing within the application. Possession of the APP_KEY enables an attacker to craft malicious signed requests that the application will accept as valid. This flaw effectively allows remote code execution (RCE) on the appliance without any authentication or user interaction. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-312 (Cleartext Storage of Sensitive Information). The CVSS v4.0 base score is 10.0, indicating a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the exposure of clear-text passwords and cryptographic keys combined with the ability to execute arbitrary code remotely represents a severe threat to affected environments. The vulnerability is identified by the vendor as V-2024-018 and impacts all versions prior to the specified patched releases. This vulnerability compromises the core security of the appliance, potentially allowing attackers to fully control the print infrastructure and pivot to other internal systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for enterprises and public sector entities relying on Vasion Print Virtual Appliance Host for centralized print management. Successful exploitation could lead to full compromise of the print appliance, exposing sensitive configuration data and credentials, and enabling attackers to execute arbitrary code remotely. This could disrupt printing services critical to business operations, leak confidential information, and provide a foothold for lateral movement within corporate networks. Given the appliance’s role in managing print jobs and potentially sensitive documents, confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Furthermore, disruption of print services could impact operational continuity in sectors such as healthcare, government, and finance, where reliable document handling is essential. The critical severity and ease of exploitation without authentication make this vulnerability particularly dangerous in environments where network segmentation or additional access controls are insufficient.

Mitigation Recommendations

Organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to versions 22.0.1026 or later for the appliance and 20.0.2702 or later for the application. If immediate patching is not feasible, restrict network access to the appliance’s management interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted administrators only. Disable or restrict access to the vulnerable REST API endpoints if possible. Conduct thorough audits of appliance logs and configurations to detect any signs of unauthorized access or exploitation attempts. Rotate any exposed credentials and cryptographic keys, including the Laravel APP_KEY, after patching. Implement network monitoring and intrusion detection systems to alert on suspicious API requests or anomalous behavior related to the print appliance. Finally, incorporate this vulnerability into incident response plans and ensure staff are aware of the potential impact and remediation steps.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5d8

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 9/29/2025, 8:47:11 PM

Last updated: 10/6/2025, 5:23:26 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats