Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34222: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34222cvecve-2025-34222cwe-306cwe-434
Published: Mon Sep 29 2025 (09/29/2025, 20:41:52 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:48:58 UTC

Technical Analysis

CVE-2025-34222 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host and Application deployments prior to versions 22.0.1049 and 20.0.2786 respectively. The vulnerability arises from four administrative HTTP routes (/admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid}) that are exposed without any authentication checks. These routes are implemented in the /var/www/app/routes/web.php file within the printercloud/pi Docker container and handled by the HPCertificateController class, which lacks user validation. This allows an unauthenticated attacker to upload malicious TLS/SSL certificates, effectively replacing the trusted root certificates used by the appliance. Such an action can lead to interception and decryption of encrypted traffic, undermining the confidentiality and integrity of communications. Additionally, attackers can delete existing certificates, causing immediate loss of trust and potential service outages. The /admin/certs/serviceclients/{scid} endpoint suffers from an Insecure Direct Object Reference (IDOR) vulnerability, enabling enumeration and unauthorized access to stored CA or client certificates. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 4.0 base score is 10.0, reflecting its critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the vulnerability represents a significant risk due to the ability to manipulate trusted certificates and disrupt secure printing services.

Potential Impact

For European organizations, this vulnerability poses a severe threat to the security and reliability of printing infrastructure, which is often integrated into broader IT and document management systems. Exploitation can lead to man-in-the-middle attacks by replacing trusted root certificates, allowing attackers to intercept or alter sensitive print jobs and related communications. Deletion of certificates can cause immediate service disruption, impacting business continuity. The ability to enumerate and download client certificates increases the risk of credential theft and lateral movement within networks. Critical sectors such as government, healthcare, finance, and manufacturing, which rely heavily on secure document handling and printing, may face operational and reputational damage. Additionally, organizations subject to strict data protection regulations like GDPR could incur compliance violations and penalties if sensitive data confidentiality is compromised. The high severity and ease of exploitation without authentication make this vulnerability particularly dangerous for European enterprises using Vasion Print solutions.

Mitigation Recommendations

1. Immediate upgrade to Vasion Print Virtual Appliance Host version 22.0.1049 or later and Application version 20.0.2786 or later once patches are released. 2. Until patches are available, restrict network access to the affected administrative API endpoints using firewall rules or network segmentation to limit exposure to trusted administrators only. 3. Implement Web Application Firewall (WAF) rules to detect and block unauthorized access attempts to the vulnerable routes. 4. Monitor logs for any suspicious activity targeting the /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients endpoints. 5. Conduct a thorough audit of existing TLS/SSL certificates on the appliance to detect unauthorized changes or deletions. 6. Employ certificate pinning and validation mechanisms where possible to detect and prevent use of malicious certificates. 7. Educate IT and security teams about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Limit administrative privileges and enforce strong authentication and authorization controls on management interfaces beyond the vulnerable routes. 9. Regularly back up certificate stores and configuration to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5ea

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 10/6/2025, 8:48:58 PM

Last updated: 10/7/2025, 4:44:17 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats