Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34222: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34222cvecve-2025-34222cwe-306cwe-434
Published: Mon Sep 29 2025 (09/29/2025, 20:41:52 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.

AI-Powered Analysis

AILast updated: 11/24/2025, 17:31:36 UTC

Technical Analysis

CVE-2025-34222 is a critical security vulnerability affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 in VA/SaaS deployments. The vulnerability arises because four administrative HTTP routes (/admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid}) are exposed without any authentication checks. These routes are implemented in the /var/www/app/routes/web.php file within the printercloud/pi Docker container and handled by the HPCertificateController class, which does not perform user validation. As a result, an unauthenticated attacker can upload new TLS/SSL certificates, effectively replacing the trusted root certificates used by the appliance. This can allow attackers to intercept or manipulate encrypted communications by performing man-in-the-middle attacks. Additionally, attackers can delete existing certificates, causing immediate loss of trust and service disruption for dependent services. The /admin/certs/serviceclients/{scid} endpoint also suffers from an Insecure Direct Object Reference (IDOR) vulnerability, enabling enumeration and unauthorized access to stored CA or client certificates. The vulnerability is identified by the vendor as V-2024-028 and is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 4.0 base score is 10.0, indicating critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the critical nature of certificate management and the ease of exploitation.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the security and trustworthiness of their print infrastructure and related services. Exploitation can lead to unauthorized issuance or deletion of TLS/SSL certificates, enabling attackers to intercept sensitive communications, impersonate legitimate services, or disrupt printing and document workflows. This can result in data breaches, loss of confidentiality, and operational downtime. The ability to enumerate client IDs and access stored certificates further increases the risk of credential theft and lateral movement within networks. Organizations relying on Vasion Print appliances for centralized print management, especially in sectors like government, finance, healthcare, and critical infrastructure, could face significant reputational damage, regulatory penalties under GDPR, and operational disruptions. The criticality of this vulnerability demands immediate attention to prevent exploitation that could compromise secure communications and trust chains within enterprise environments.

Mitigation Recommendations

1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later once patches are available. 2. Until patches are applied, restrict network access to the affected administrative API endpoints by implementing firewall rules or network segmentation to limit access to trusted administrators only. 3. Monitor network traffic for unusual requests targeting the /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} endpoints. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthenticated access attempts to these routes. 5. Conduct thorough audits of existing TLS/SSL certificates and client IDs to detect unauthorized changes or anomalies. 6. Implement strict access controls and multi-factor authentication for administrative interfaces once authentication is enforced. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Review and enhance logging and alerting mechanisms for certificate management operations to enable quick incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5ea

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 11/24/2025, 5:31:36 PM

Last updated: 1/7/2026, 5:43:43 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats