CVE-2025-34220: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contains a /api-gateway/identity/search-groups endpoint that does not require authentication. Requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and adjustments to the `Host` header allow an unauthenticated remote attacker to enumerate every group object stored for that tenant. The response includes internal identifiers (group ID, source service ID, Azure AD object IDs, creation timestamps, and tenant IDs). This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
AI Analysis
Technical Summary
CVE-2025-34220 is a vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-200 (Information Exposure) affecting Vasion Print Virtual Appliance Host and Application in VA/SaaS deployments prior to versions 25.1.102 and 25.1.1413 respectively. The vulnerability exists because the /api-gateway/identity/search-groups endpoint does not enforce authentication, allowing any unauthenticated remote attacker to send requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and enumerate all group objects associated with that tenant. By manipulating the Host header, attackers can retrieve detailed internal information including group IDs, source service IDs, Azure Active Directory object IDs, creation timestamps, and tenant IDs. This information disclosure can facilitate further targeted attacks such as privilege escalation, lateral movement, or social engineering by providing attackers with a detailed map of the tenant’s group structure and identity references. The vulnerability is remotely exploitable without any privileges or user interaction, increasing its risk profile. While no active exploits have been reported, the vulnerability’s medium CVSS score (6.9) reflects the significant confidentiality impact combined with ease of exploitation. The vendor has confirmed remediation, but the timeline for patch deployment is not clearly documented, which may leave some deployments exposed. This vulnerability highlights the critical need for proper authentication controls on API endpoints that expose sensitive identity and group information in cloud or virtual appliance environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-34220 is the unauthorized disclosure of sensitive identity and group information within Vasion Print environments. This information leakage can aid attackers in reconnaissance activities, enabling them to map organizational structures, identify privileged groups, and potentially craft more effective targeted attacks such as phishing or privilege escalation attempts. Organizations relying on Vasion Print for print management in VA/SaaS deployments may face increased risk of data breaches or lateral movement if attackers leverage this information. Confidentiality is directly impacted, while integrity and availability are not affected by this vulnerability. The exposure of Azure AD object IDs and tenant IDs is particularly concerning for organizations heavily integrated with Microsoft cloud services, as it may facilitate identity-based attacks. Given the widespread use of print management solutions in enterprises, the vulnerability could affect a broad range of sectors including government, finance, healthcare, and manufacturing across Europe. The lack of authentication requirement and remote exploitability increase the urgency for European organizations to assess their exposure and remediate promptly to prevent potential exploitation and subsequent attacks.
Mitigation Recommendations
European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to versions 25.1.102 or later for the appliance and 25.1.1413 or later for the application to ensure the vulnerability is patched. If immediate patching is not feasible, organizations should implement network-level access controls to restrict access to the /api-gateway/identity/search-groups endpoint, limiting it to trusted internal IP addresses or VPN users only. Monitoring and logging of access to this endpoint should be enabled to detect any anomalous or unauthorized requests indicative of reconnaissance attempts. Additionally, organizations should review and tighten API gateway configurations and Host header validation to prevent header manipulation attacks. Conducting regular security audits and penetration tests focusing on API authentication controls can help identify similar weaknesses. Finally, educating security teams about this vulnerability and ensuring incident response plans include scenarios involving identity enumeration attacks will improve preparedness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Ireland
CVE-2025-34220: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contains a /api-gateway/identity/search-groups endpoint that does not require authentication. Requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and adjustments to the `Host` header allow an unauthenticated remote attacker to enumerate every group object stored for that tenant. The response includes internal identifiers (group ID, source service ID, Azure AD object IDs, creation timestamps, and tenant IDs). This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
AI-Powered Analysis
Technical Analysis
CVE-2025-34220 is a vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-200 (Information Exposure) affecting Vasion Print Virtual Appliance Host and Application in VA/SaaS deployments prior to versions 25.1.102 and 25.1.1413 respectively. The vulnerability exists because the /api-gateway/identity/search-groups endpoint does not enforce authentication, allowing any unauthenticated remote attacker to send requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and enumerate all group objects associated with that tenant. By manipulating the Host header, attackers can retrieve detailed internal information including group IDs, source service IDs, Azure Active Directory object IDs, creation timestamps, and tenant IDs. This information disclosure can facilitate further targeted attacks such as privilege escalation, lateral movement, or social engineering by providing attackers with a detailed map of the tenant’s group structure and identity references. The vulnerability is remotely exploitable without any privileges or user interaction, increasing its risk profile. While no active exploits have been reported, the vulnerability’s medium CVSS score (6.9) reflects the significant confidentiality impact combined with ease of exploitation. The vendor has confirmed remediation, but the timeline for patch deployment is not clearly documented, which may leave some deployments exposed. This vulnerability highlights the critical need for proper authentication controls on API endpoints that expose sensitive identity and group information in cloud or virtual appliance environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-34220 is the unauthorized disclosure of sensitive identity and group information within Vasion Print environments. This information leakage can aid attackers in reconnaissance activities, enabling them to map organizational structures, identify privileged groups, and potentially craft more effective targeted attacks such as phishing or privilege escalation attempts. Organizations relying on Vasion Print for print management in VA/SaaS deployments may face increased risk of data breaches or lateral movement if attackers leverage this information. Confidentiality is directly impacted, while integrity and availability are not affected by this vulnerability. The exposure of Azure AD object IDs and tenant IDs is particularly concerning for organizations heavily integrated with Microsoft cloud services, as it may facilitate identity-based attacks. Given the widespread use of print management solutions in enterprises, the vulnerability could affect a broad range of sectors including government, finance, healthcare, and manufacturing across Europe. The lack of authentication requirement and remote exploitability increase the urgency for European organizations to assess their exposure and remediate promptly to prevent potential exploitation and subsequent attacks.
Mitigation Recommendations
European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to versions 25.1.102 or later for the appliance and 25.1.1413 or later for the application to ensure the vulnerability is patched. If immediate patching is not feasible, organizations should implement network-level access controls to restrict access to the /api-gateway/identity/search-groups endpoint, limiting it to trusted internal IP addresses or VPN users only. Monitoring and logging of access to this endpoint should be enabled to detect any anomalous or unauthorized requests indicative of reconnaissance attempts. Additionally, organizations should review and tighten API gateway configurations and Host header validation to prevent header manipulation attacks. Conducting regular security audits and penetration tests focusing on API authentication controls can help identify similar weaknesses. Finally, educating security teams about this vulnerability and ensuring incident response plans include scenarios involving identity enumeration attacks will improve preparedness.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.574Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68daefb54b0d68cddf56c5de
Added to database: 9/29/2025, 8:44:37 PM
Last enriched: 11/24/2025, 5:31:14 PM
Last updated: 1/7/2026, 4:17:37 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.