Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34222: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34222cvecve-2025-34222cwe-306cwe-434
Published: Mon Sep 29 2025 (09/29/2025, 20:41:52 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.

AI-Powered Analysis

AILast updated: 11/17/2025, 15:44:11 UTC

Technical Analysis

CVE-2025-34222 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host and Application versions prior to 22.0.1049 and 20.0.2786 respectively. The vulnerability arises from four administrative HTTP routes (/admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid}) that are exposed without any authentication checks. These routes are implemented in the HPCertificateController class within the printercloud/pi Docker container and allow unauthenticated attackers to perform sensitive operations on TLS/SSL certificates. Specifically, attackers can upload new TLS/SSL certificates, effectively replacing the trusted root certificate used by the appliance, which can lead to man-in-the-middle attacks or interception of encrypted traffic. They can also delete existing certificates, causing immediate trust failures and service disruption. Additionally, the serviceclients endpoint suffers from an Insecure Direct Object Reference (IDOR) vulnerability, enabling enumeration and unauthorized download of stored CA and client certificates. This combination of missing authentication and IDOR represents a severe security flaw impacting confidentiality, integrity, and availability of the printing infrastructure. The vulnerability has been assigned a CVSS 4.0 base score of 10.0, reflecting its criticality due to network attack vector, no required privileges or user interaction, and high impact on all security properties. Although no exploits are currently known in the wild, the ease of exploitation and potential impact make this a high-priority issue for affected organizations. The vendor has identified this as V-2024-028 and it is recommended to upgrade to fixed versions or apply mitigations promptly.

Potential Impact

For European organizations, the impact of CVE-2025-34222 is significant, particularly for enterprises, government agencies, and managed print service providers relying on Vasion Print Virtual Appliance Host for secure print management. Exploitation can lead to unauthorized issuance or deletion of TLS/SSL certificates, undermining the trust model of encrypted communications within the print infrastructure. This can result in interception of sensitive documents, credential theft, or disruption of printing services, impacting business continuity and confidentiality. The ability to enumerate client IDs and download certificates further exposes sensitive cryptographic material, increasing the risk of lateral movement or impersonation attacks within corporate networks. Given the critical nature of printing services in many European organizations, including those handling sensitive personal data under GDPR, this vulnerability poses compliance and operational risks. Additionally, disruption or compromise of print services in critical infrastructure sectors such as finance, healthcare, and government could have cascading effects on service delivery and data protection obligations.

Mitigation Recommendations

Organizations should immediately verify if they are running affected versions of Vasion Print Virtual Appliance Host or Application. The primary mitigation is to upgrade to the vendor’s fixed versions (22.0.1049 or later for the appliance and 20.0.2786 or later for the application) once available. Until patches are applied, organizations should restrict network access to the appliance’s administrative API endpoints using firewall rules or network segmentation to prevent unauthenticated external access. Implement strict access controls and monitoring on the appliance’s management interfaces. Conduct thorough audits of existing certificates to detect unauthorized changes or deletions. Employ network intrusion detection systems to identify suspicious activity targeting the exposed routes. Additionally, consider deploying web application firewalls (WAFs) with custom rules to block unauthenticated requests to the vulnerable endpoints. Regularly review and update incident response plans to include scenarios involving certificate compromise. Finally, coordinate with Vasion support for any interim security advisories or recommended workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5ea

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 11/17/2025, 3:44:11 PM

Last updated: 11/21/2025, 6:15:59 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats