Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34223: CWE-798 Use of Hard-coded Credentials in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34223cvecve-2025-34223cwe-798cwe-306
Published: Mon Sep 29 2025 (09/29/2025, 20:38:05 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.

AI-Powered Analysis

AILast updated: 11/17/2025, 15:44:35 UTC

Technical Analysis

CVE-2025-34223 is a critical security vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 22.0.1049 and Application versions prior to 20.0.2786 used in VA/SaaS deployments. The vulnerability stems from the presence of a default administrative account combined with an installation-time web endpoint located at `/admin/query/update_database.php` that is accessible without any authentication. This endpoint accepts POST requests that allow an attacker to supply arbitrary `root_user` and `root_password` parameters, which the script uses to overwrite the default admin credentials. The vulnerability is worsened by the presence of hard-coded SHA-512 and SHA-1 hashes of the default password within the script, which attackers can leverage to bypass any password policy validation mechanisms. Consequently, an unauthenticated remote attacker who can reach this installation interface can gain full administrative control over the appliance during its initial setup phase. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials) and CWE-306 (Missing Authentication for Critical Function). The CVSS 4.0 score of 10.0 reflects the vulnerability's criticality, with attack vector being network-based, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. The vendor has identified this issue as V-2024-022 and it requires immediate remediation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of the Vasion Print Virtual Appliance Host, granting attackers full administrative privileges. This can result in unauthorized access to sensitive print jobs, manipulation or deletion of print queues, disruption of printing services critical to business operations, and potential lateral movement within the network. Given the appliance's role in managing print infrastructure, attackers could intercept confidential documents or inject malicious print jobs. The loss of integrity and availability of print services can affect operational continuity, especially in sectors like government, finance, healthcare, and manufacturing where printing remains integral. Furthermore, unauthorized administrative access could be leveraged to deploy further malware or exfiltrate data. The vulnerability's network accessibility and lack of authentication requirements increase the risk of widespread exploitation, particularly in environments where the appliance is exposed to less secure network segments or the internet. The critical severity underscores the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediately upgrade Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later, where the vulnerability is patched. 2. Restrict network access to the `/admin/query/update_database.php` endpoint by implementing firewall rules or network segmentation to limit access only to trusted administrators and internal management networks. 3. Conduct a thorough audit of appliance logs and configurations to detect any unauthorized changes to administrative credentials or suspicious POST requests to the vulnerable endpoint. 4. Enforce strong credential policies and replace any default or hard-coded credentials with unique, complex passwords. 5. Monitor network traffic for anomalous activity targeting the installation endpoint, especially POST requests attempting to modify credentials. 6. If patching is not immediately feasible, consider disabling or restricting the installation web interface until a fix can be applied. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include steps to handle potential exploitation scenarios. 8. Regularly review vendor advisories for updates or additional mitigations related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5f0

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 11/17/2025, 3:44:35 PM

Last updated: 11/21/2025, 3:19:43 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats