Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34220: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Medium
VulnerabilityCVE-2025-34220cvecve-2025-34220cwe-306cwe-200
Published: Mon Sep 29 2025 (09/29/2025, 20:42:17 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contains a /api-gateway/identity/search-groups endpoint that does not require authentication. Requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and adjustments to the `Host` header allow an unauthenticated remote attacker to enumerate every group object stored for that tenant. The response includes internal identifiers (group ID, source service ID, Azure AD object IDs, creation timestamps, and tenant IDs). This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 11/24/2025, 17:31:14 UTC

Technical Analysis

CVE-2025-34220 is a vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-200 (Information Exposure) affecting Vasion Print Virtual Appliance Host and Application in VA/SaaS deployments prior to versions 25.1.102 and 25.1.1413 respectively. The vulnerability exists because the /api-gateway/identity/search-groups endpoint does not enforce authentication, allowing any unauthenticated remote attacker to send requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and enumerate all group objects associated with that tenant. By manipulating the Host header, attackers can retrieve detailed internal information including group IDs, source service IDs, Azure Active Directory object IDs, creation timestamps, and tenant IDs. This information disclosure can facilitate further targeted attacks such as privilege escalation, lateral movement, or social engineering by providing attackers with a detailed map of the tenant’s group structure and identity references. The vulnerability is remotely exploitable without any privileges or user interaction, increasing its risk profile. While no active exploits have been reported, the vulnerability’s medium CVSS score (6.9) reflects the significant confidentiality impact combined with ease of exploitation. The vendor has confirmed remediation, but the timeline for patch deployment is not clearly documented, which may leave some deployments exposed. This vulnerability highlights the critical need for proper authentication controls on API endpoints that expose sensitive identity and group information in cloud or virtual appliance environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-34220 is the unauthorized disclosure of sensitive identity and group information within Vasion Print environments. This information leakage can aid attackers in reconnaissance activities, enabling them to map organizational structures, identify privileged groups, and potentially craft more effective targeted attacks such as phishing or privilege escalation attempts. Organizations relying on Vasion Print for print management in VA/SaaS deployments may face increased risk of data breaches or lateral movement if attackers leverage this information. Confidentiality is directly impacted, while integrity and availability are not affected by this vulnerability. The exposure of Azure AD object IDs and tenant IDs is particularly concerning for organizations heavily integrated with Microsoft cloud services, as it may facilitate identity-based attacks. Given the widespread use of print management solutions in enterprises, the vulnerability could affect a broad range of sectors including government, finance, healthcare, and manufacturing across Europe. The lack of authentication requirement and remote exploitability increase the urgency for European organizations to assess their exposure and remediate promptly to prevent potential exploitation and subsequent attacks.

Mitigation Recommendations

European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to versions 25.1.102 or later for the appliance and 25.1.1413 or later for the application to ensure the vulnerability is patched. If immediate patching is not feasible, organizations should implement network-level access controls to restrict access to the /api-gateway/identity/search-groups endpoint, limiting it to trusted internal IP addresses or VPN users only. Monitoring and logging of access to this endpoint should be enabled to detect any anomalous or unauthorized requests indicative of reconnaissance attempts. Additionally, organizations should review and tighten API gateway configurations and Host header validation to prevent header manipulation attacks. Conducting regular security audits and penetration tests focusing on API authentication controls can help identify similar weaknesses. Finally, educating security teams about this vulnerability and ensuring incident response plans include scenarios involving identity enumeration attacks will improve preparedness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5de

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 11/24/2025, 5:31:14 PM

Last updated: 1/7/2026, 4:17:37 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats