Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34218: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34218cvecve-2025-34218cwe-306
Published: Mon Sep 29 2025 (09/29/2025, 20:34:23 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose internal Docker containers through the gw Docker instance. The gateway publishes a /meta endpoint which lists every micro‑service container together with version information. These containers are reachable directly over HTTP/HTTPS without any access‑control list (ACL), authentication or rate‑limiting. Consequently, any attacker on the LAN or the Internet can enumerate all internal services and their versions, interact with the exposed APIs of each microservice as an unauthenticated user, or issue malicious requests that may lead to information disclosure, privilege escalation within the container, or denial‑of‑service of the entire appliance. The root cause is the absence of authentication and network‑level restrictions on the API‑gateway’s proxy to internal Docker containers, effectively turning the internal service mesh into a public attack surface. This vulnerability has been identified by the vendor as: V-2024-030 — Exposed Internal Docker Instance (LAN).

AI-Powered Analysis

AILast updated: 10/06/2025, 21:40:49 UTC

Technical Analysis

CVE-2025-34218 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host versions prior to 22.0.1049 and the application prior to 20.0.2786 in VA/SaaS deployments. The root cause is the exposure of internal Docker containers through the gateway Docker instance, which publishes a /meta endpoint listing all microservice containers and their version information. These containers are directly accessible over HTTP/HTTPS without any authentication, access control lists (ACLs), or rate limiting. This design flaw effectively exposes the internal service mesh to unauthenticated users on both local area networks and the Internet. An attacker can enumerate all internal services, interact with their APIs without credentials, and potentially exploit these services to disclose sensitive information, escalate privileges within containers, or cause denial-of-service conditions that impact the entire appliance. The vulnerability stems from the absence of authentication and network-level restrictions on the API gateway’s proxy to internal Docker containers, turning what should be an internal-only interface into a public attack surface. The CVSS 4.0 base score is 10.0, reflecting the vulnerability’s critical impact on confidentiality, integrity, and availability, with no required privileges or user interaction, and full network accessibility. Although no known exploits are currently reported in the wild, the vulnerability represents a severe risk due to the ease of exploitation and broad impact. The vendor has identified this issue as V-2024-030 and it affects all versions prior to the specified fixed releases. Organizations deploying Vasion Print Virtual Appliance Hosts should urgently apply updates and implement network-level protections to mitigate this risk.

Potential Impact

For European organizations, this vulnerability poses a critical risk to the confidentiality, integrity, and availability of printing infrastructure and potentially connected internal networks. Exploitation can lead to unauthorized disclosure of sensitive information about internal microservices and their versions, enabling further targeted attacks. Privilege escalation within containers could allow attackers to gain control over printing services or pivot to other internal systems. Denial-of-service attacks could disrupt printing operations, impacting business continuity, especially in sectors reliant on print workflows such as legal, healthcare, and government. Given the appliance’s exposure to both LAN and Internet, organizations with remote or hybrid work environments face increased risk. The critical CVSS score underscores the potential for widespread impact if exploited. Additionally, the lack of authentication and ACLs means that even low-skilled attackers can exploit this vulnerability, increasing the threat landscape. The exposure of internal service mesh details also aids attackers in reconnaissance and crafting sophisticated attacks. Overall, the vulnerability threatens operational stability and data security for European enterprises using this product.

Mitigation Recommendations

1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the application to 20.0.2786 or later, where the vulnerability is patched. 2. Implement strict network segmentation to isolate the appliance from untrusted networks, ensuring that the internal Docker containers and the API gateway are not directly reachable from the Internet or untrusted LAN segments. 3. Deploy firewall rules or access control lists to restrict access to the gateway’s /meta endpoint and internal Docker container interfaces to authorized management hosts only. 4. Monitor network traffic to and from the appliance for unusual or unauthorized access attempts, focusing on HTTP/HTTPS requests targeting the /meta endpoint or internal microservice APIs. 5. If patching is delayed, consider deploying a reverse proxy or web application firewall (WAF) in front of the appliance to enforce authentication and rate limiting on exposed endpoints. 6. Conduct regular vulnerability scans and penetration tests to verify that no internal services are exposed without proper authentication. 7. Review and harden container configurations and microservice APIs to minimize the impact of potential privilege escalation. 8. Maintain up-to-date incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daee27ec38439ac41e3a6a

Added to database: 9/29/2025, 8:37:59 PM

Last enriched: 10/6/2025, 9:40:49 PM

Last updated: 11/13/2025, 11:18:04 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats