Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34220: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Medium
VulnerabilityCVE-2025-34220cvecve-2025-34220cwe-306cwe-200
Published: Mon Sep 29 2025 (09/29/2025, 20:42:17 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contains a /api-gateway/identity/search-groups endpoint that does not require authentication. Requests to https://<tenant>.printercloud10.com/api-gateway/identity/search-groups and adjustments to the `Host` header allow an unauthenticated remote attacker to enumerate every group object stored for that tenant. The response includes internal identifiers (group ID, source service ID, Azure AD object IDs, creation timestamps, and tenant IDs). This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:48:41 UTC

Technical Analysis

CVE-2025-34220 is a vulnerability in Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 25.1.102 and Application versions prior to 25.1.1413, affecting both VA and SaaS deployments. The vulnerability arises from the /api-gateway/identity/search-groups API endpoint, which does not enforce authentication. An unauthenticated attacker can send crafted requests to this endpoint, including manipulating the Host header, to enumerate all group objects associated with a specific tenant. The response discloses sensitive internal identifiers such as group IDs, source service IDs, Azure Active Directory object IDs, creation timestamps, and tenant IDs. This information leakage can aid attackers in reconnaissance, facilitating further targeted attacks such as privilege escalation, lateral movement, or social engineering. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-200 (Information Exposure). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact. No known exploits have been reported publicly, and the vendor has remediated the issue, although the exact patch release date is unspecified. The vulnerability affects all versions prior to the fixed releases, implying a broad attack surface for unpatched deployments.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of internal group and identity information within the Vasion Print environment. Disclosure of group IDs, Azure AD object IDs, and tenant identifiers can facilitate targeted attacks such as identity spoofing, privilege escalation, or crafting of phishing campaigns tailored to internal organizational structures. While it does not directly allow system compromise or availability disruption, the information leakage can be a stepping stone for more severe attacks. Organizations with extensive use of Vasion Print in managed print services or large enterprise environments are at higher risk. The exposure of Azure AD object IDs is particularly sensitive given the widespread use of Azure AD in Europe for identity management. Additionally, the vulnerability could undermine trust in managed print infrastructure and complicate compliance with data protection regulations like GDPR if tenant-specific information is leaked. The lack of authentication requirement means any external attacker with network access to the appliance or SaaS endpoint can exploit this vulnerability, increasing the risk surface.

Mitigation Recommendations

European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to at least 25.1.102 and 25.1.1413 or later where the vulnerability is patched. If upgrading is not immediately possible, restrict network access to the /api-gateway/identity/search-groups endpoint by implementing strict firewall rules or network segmentation to limit access only to trusted administrative networks. Monitor network traffic for unusual requests targeting this endpoint, especially those with manipulated Host headers. Employ strong identity and access management controls around the print infrastructure and audit logs for suspicious activity. Coordinate with Vasion support to confirm patch availability and deployment timelines. Additionally, review Azure AD and group configurations for any anomalies that could be exploited using the leaked identifiers. Consider implementing anomaly detection on authentication and group membership changes to detect potential misuse stemming from reconnaissance activities. Finally, incorporate this vulnerability into incident response plans and threat hunting exercises to identify any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5de

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 10/6/2025, 8:48:41 PM

Last updated: 11/13/2025, 11:35:51 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats