Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34224: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Critical
VulnerabilityCVE-2025-34224cvecve-2025-34224cwe-306
Published: Mon Sep 29 2025 (09/29/2025, 20:42:51 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose a set of PHP scripts under the `console_release` directory without requiring authentication. An unauthenticated remote attacker can invoke these endpoints to re‑configure networked printers, add or delete RFID badge devices, or otherwise modify device settings. This vulnerability has been identified by the vendor as: V-2024-029 — No Authentication to Modify Devices.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:45:50 UTC

Technical Analysis

CVE-2025-34224 is a critical vulnerability affecting Vasion Print Virtual Appliance Host (formerly PrinterLogic) versions prior to 22.0.1049 and Application versions prior to 20.0.2786, specifically in VA/SaaS deployments. The vulnerability arises from a lack of authentication controls on a set of PHP scripts located under the 'console_release' directory. These scripts can be accessed remotely without any authentication, allowing an unauthenticated attacker to invoke endpoints that enable reconfiguration of networked printers, addition or deletion of RFID badge devices, and modification of other device settings. This vulnerability is classified under CWE-306, which pertains to missing authentication for critical functions. The CVSS 4.0 base score is 10.0, indicating a critical severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The vulnerability affects all versions prior to the fixed releases, and no patches or exploits in the wild have been reported at the time of publication. The vendor has identified this issue as V-2024-029, emphasizing the absence of authentication controls to modify devices. This flaw allows attackers to fully control printer configurations and connected devices remotely, potentially leading to widespread disruption of printing infrastructure, unauthorized access to sensitive print jobs, and manipulation of physical access controls via RFID devices. Given the critical nature of printing services in enterprise environments and the integration of printers with other networked systems, exploitation could serve as a pivot point for further network compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Vasion Print solutions in enterprise and public sector environments. The ability for an unauthenticated attacker to reconfigure printers and manipulate RFID badge devices could lead to operational disruptions, data leakage through intercepted or altered print jobs, and unauthorized physical access if RFID badges are used for building entry controls. Critical infrastructure sectors such as government, healthcare, finance, and manufacturing, which rely heavily on secure printing and access control systems, could face severe consequences including downtime, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and reputational damage. Additionally, the vulnerability could be exploited as a foothold for lateral movement within corporate networks, increasing the risk of broader cyberattacks. The lack of authentication and ease of exploitation (no privileges or user interaction required) amplify the threat, making it highly attractive for threat actors targeting European entities.

Mitigation Recommendations

Immediate mitigation steps should include isolating the affected Vasion Print Virtual Appliance Hosts from untrusted networks and restricting access to the 'console_release' directory via network-level controls such as firewalls or VPNs. Organizations should implement strict network segmentation to limit exposure of print infrastructure. Monitoring and logging access to printer management interfaces should be enhanced to detect any unauthorized attempts. Since no patches are currently available, temporary measures could include deploying web application firewalls (WAFs) with custom rules to block unauthenticated access to the vulnerable PHP scripts. Organizations should also review and harden authentication mechanisms for all printer management interfaces and consider disabling unused management endpoints. Once vendor patches are released, prompt application is critical. Additionally, organizations should audit RFID badge device configurations and access logs to identify any suspicious changes or unauthorized device additions. Employee awareness training on recognizing unusual printer behavior or access issues can aid early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb54b0d68cddf56c5f6

Added to database: 9/29/2025, 8:44:37 PM

Last enriched: 9/29/2025, 8:45:50 PM

Last updated: 10/6/2025, 6:22:30 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats