CVE-2025-34222: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.
AI Analysis
Technical Summary
CVE-2025-34222 is a critical security vulnerability affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 in VA/SaaS deployments. The vulnerability arises because four administrative HTTP routes (/admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid}) are exposed without any authentication checks. These routes are implemented in the /var/www/app/routes/web.php file within the printercloud/pi Docker container and handled by the HPCertificateController class, which does not perform user validation. As a result, an unauthenticated attacker can upload new TLS/SSL certificates, effectively replacing the trusted root certificates used by the appliance. This can allow attackers to intercept or manipulate encrypted communications by performing man-in-the-middle attacks. Additionally, attackers can delete existing certificates, causing immediate loss of trust and service disruption for dependent services. The /admin/certs/serviceclients/{scid} endpoint also suffers from an Insecure Direct Object Reference (IDOR) vulnerability, enabling enumeration and unauthorized access to stored CA or client certificates. The vulnerability is identified by the vendor as V-2024-028 and is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 4.0 base score is 10.0, indicating critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the critical nature of certificate management and the ease of exploitation.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the security and trustworthiness of their print infrastructure and related services. Exploitation can lead to unauthorized issuance or deletion of TLS/SSL certificates, enabling attackers to intercept sensitive communications, impersonate legitimate services, or disrupt printing and document workflows. This can result in data breaches, loss of confidentiality, and operational downtime. The ability to enumerate client IDs and access stored certificates further increases the risk of credential theft and lateral movement within networks. Organizations relying on Vasion Print appliances for centralized print management, especially in sectors like government, finance, healthcare, and critical infrastructure, could face significant reputational damage, regulatory penalties under GDPR, and operational disruptions. The criticality of this vulnerability demands immediate attention to prevent exploitation that could compromise secure communications and trust chains within enterprise environments.
Mitigation Recommendations
1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later once patches are available. 2. Until patches are applied, restrict network access to the affected administrative API endpoints by implementing firewall rules or network segmentation to limit access to trusted administrators only. 3. Monitor network traffic for unusual requests targeting the /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} endpoints. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthenticated access attempts to these routes. 5. Conduct thorough audits of existing TLS/SSL certificates and client IDs to detect unauthorized changes or anomalies. 6. Implement strict access controls and multi-factor authentication for administrative interfaces once authentication is enforced. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Review and enhance logging and alerting mechanisms for certificate management operations to enable quick incident response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-34222: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.
AI-Powered Analysis
Technical Analysis
CVE-2025-34222 is a critical security vulnerability affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 in VA/SaaS deployments. The vulnerability arises because four administrative HTTP routes (/admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid}) are exposed without any authentication checks. These routes are implemented in the /var/www/app/routes/web.php file within the printercloud/pi Docker container and handled by the HPCertificateController class, which does not perform user validation. As a result, an unauthenticated attacker can upload new TLS/SSL certificates, effectively replacing the trusted root certificates used by the appliance. This can allow attackers to intercept or manipulate encrypted communications by performing man-in-the-middle attacks. Additionally, attackers can delete existing certificates, causing immediate loss of trust and service disruption for dependent services. The /admin/certs/serviceclients/{scid} endpoint also suffers from an Insecure Direct Object Reference (IDOR) vulnerability, enabling enumeration and unauthorized access to stored CA or client certificates. The vulnerability is identified by the vendor as V-2024-028 and is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 4.0 base score is 10.0, indicating critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the critical nature of certificate management and the ease of exploitation.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the security and trustworthiness of their print infrastructure and related services. Exploitation can lead to unauthorized issuance or deletion of TLS/SSL certificates, enabling attackers to intercept sensitive communications, impersonate legitimate services, or disrupt printing and document workflows. This can result in data breaches, loss of confidentiality, and operational downtime. The ability to enumerate client IDs and access stored certificates further increases the risk of credential theft and lateral movement within networks. Organizations relying on Vasion Print appliances for centralized print management, especially in sectors like government, finance, healthcare, and critical infrastructure, could face significant reputational damage, regulatory penalties under GDPR, and operational disruptions. The criticality of this vulnerability demands immediate attention to prevent exploitation that could compromise secure communications and trust chains within enterprise environments.
Mitigation Recommendations
1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later once patches are available. 2. Until patches are applied, restrict network access to the affected administrative API endpoints by implementing firewall rules or network segmentation to limit access to trusted administrators only. 3. Monitor network traffic for unusual requests targeting the /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} endpoints. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthenticated access attempts to these routes. 5. Conduct thorough audits of existing TLS/SSL certificates and client IDs to detect unauthorized changes or anomalies. 6. Implement strict access controls and multi-factor authentication for administrative interfaces once authentication is enforced. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Review and enhance logging and alerting mechanisms for certificate management operations to enable quick incident response.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.574Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68daefb54b0d68cddf56c5ea
Added to database: 9/29/2025, 8:44:37 PM
Last enriched: 11/24/2025, 5:31:36 PM
Last updated: 1/7/2026, 5:43:43 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.