Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34218: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34218cvecve-2025-34218cwe-306
Published: Mon Sep 29 2025 (09/29/2025, 20:34:23 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose internal Docker containers through the gw Docker instance. The gateway publishes a /meta endpoint which lists every micro‑service container together with version information. These containers are reachable directly over HTTP/HTTPS without any access‑control list (ACL), authentication or rate‑limiting. Consequently, any attacker on the LAN or the Internet can enumerate all internal services and their versions, interact with the exposed APIs of each microservice as an unauthenticated user, or issue malicious requests that may lead to information disclosure, privilege escalation within the container, or denial‑of‑service of the entire appliance. The root cause is the absence of authentication and network‑level restrictions on the API‑gateway’s proxy to internal Docker containers, effectively turning the internal service mesh into a public attack surface. This vulnerability has been identified by the vendor as: V-2024-030 — Exposed Internal Docker Instance (LAN).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:42:28 UTC

Technical Analysis

CVE-2025-34218 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) prior to version 22.0.1049 and its Application prior to version 20.0.2786 in VA/SaaS deployments. The vulnerability arises because the appliance's gateway Docker instance exposes internal Docker containers through a publicly accessible /meta endpoint. This endpoint enumerates all microservice containers along with their version information. Critically, these containers are reachable directly over HTTP/HTTPS without any form of access control list (ACL), authentication, or rate limiting. Consequently, any attacker with network access—either on the local area network or via the Internet—can enumerate all internal services, interact with their APIs as an unauthenticated user, and send malicious requests. This can lead to multiple attack vectors including information disclosure of sensitive data, privilege escalation within the containerized environment, and denial-of-service conditions that could disrupt the entire appliance's availability. The root cause is the absence of authentication and network-level restrictions on the API gateway’s proxy to internal Docker containers, effectively exposing the internal service mesh as a public attack surface. The vulnerability is tracked as CWE-306 (Missing Authentication for Critical Function). The CVSS 4.0 base score is 10.0, indicating a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability’s nature and ease of exploitation make it a significant risk. The vendor has identified this issue as V-2024-030 and recommends updating to fixed versions or applying mitigations to restrict access to the gateway and internal services.

Potential Impact

The impact of CVE-2025-34218 is severe for organizations using affected versions of the Vasion Print Virtual Appliance Host. Attackers can remotely access internal microservices without authentication, enabling them to enumerate services and versions, which aids in crafting targeted attacks. Unauthorized API interactions can lead to sensitive information disclosure, including configuration details and potentially user data. Privilege escalation within containers can allow attackers to gain elevated access, potentially compromising the entire appliance and any connected systems. Denial-of-service attacks could disrupt printing services and related workflows, impacting business operations. Given the appliance’s role in print infrastructure, disruption can affect large enterprises, government agencies, and managed service providers relying on centralized print management. The vulnerability’s network accessibility and lack of required authentication increase the risk of widespread exploitation, especially in environments where the appliance is exposed to untrusted networks or insufficiently segmented LANs. The critical CVSS score reflects the potential for complete compromise without user interaction or privileges, making this a high-priority threat that could lead to operational disruption, data breaches, and lateral movement within corporate networks.

Mitigation Recommendations

To mitigate CVE-2025-34218, organizations should immediately upgrade the Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later, where the vulnerability is addressed. If immediate patching is not possible, implement strict network segmentation to isolate the appliance from untrusted networks and restrict access to the gateway Docker instance. Deploy firewall rules or access control lists to limit inbound connections to trusted management hosts only. Enable network-level authentication proxies or VPNs to ensure only authorized users can reach the internal Docker containers. Monitor network traffic for unusual API calls or enumeration attempts targeting the /meta endpoint. Employ rate limiting and intrusion detection systems to detect and block suspicious activity. Review and harden container configurations to minimize privilege escalation risks, including applying the principle of least privilege and disabling unnecessary services. Regularly audit appliance logs and conduct vulnerability scans to detect exploitation attempts. Coordinate with Vasion support for any vendor-specific mitigation guidance and stay informed about updates or patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daee27ec38439ac41e3a6a

Added to database: 9/29/2025, 8:37:59 PM

Last enriched: 2/27/2026, 1:42:28 AM

Last updated: 3/25/2026, 1:23:28 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses