Skip to main content

CVE-2025-34230: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

Medium
VulnerabilityCVE-2025-34230cvecve-2025-34230cwe-306cwe-918
Published: Mon Sep 29 2025 (09/29/2025, 20:40:39 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/hp/log_off_single_sign_on.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 09/29/2025, 20:46:39 UTC

Technical Analysis

CVE-2025-34230 is a medium-severity vulnerability affecting the Vasion Print Virtual Appliance Host and Application (formerly PrinterLogic) in versions prior to 25.1.102 and 25.1.1413 respectively. The vulnerability is a blind server-side request forgery (SSRF) flaw caused by missing authentication controls on a critical function accessible via the /var/www/app/console_release/hp/log_off_single_sign_on.php script. An unauthenticated attacker can exploit this by registering a printer with a crafted hostname. The software stores this hostname in the variable $printer_vo->str_host_address and later constructs a URL such as 'http://<host-address>:80/DevMgmt/DiscoveryTree.xml' which it requests using curl without any validation, whitelisting, or filtering against private/internal network addresses. Because the SSRF is blind, the attacker cannot directly see the response data but can use the vulnerability to probe internal services, trigger internal actions, or gather intelligence about the internal network environment. This can facilitate further attacks such as internal network reconnaissance or pivoting. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-918 (Server-Side Request Forgery). The CVSS 4.0 base score is 6.9, reflecting network attack vector, no privileges or user interaction required, and low to medium impact on confidentiality and integrity. Although a fix has been confirmed, the exact patch introduction date is unclear, and no public exploits are currently known. The vulnerability affects all versions prior to the fixed releases, indicating a broad exposure for deployments not yet updated.

Potential Impact

For European organizations using Vasion Print Virtual Appliance Host, this vulnerability poses a significant risk to internal network security. Since the appliance is often deployed in enterprise printing environments, exploitation could allow attackers to bypass perimeter defenses and access internal services that are otherwise inaccessible externally. This can lead to reconnaissance of sensitive internal infrastructure, potential triggering of unintended internal operations, and gathering of intelligence that could facilitate lateral movement or further compromise. Confidentiality and integrity of internal systems may be impacted, although availability impact is low. The unauthenticated nature of the vulnerability increases risk, as attackers do not need valid credentials or user interaction. Organizations in Europe relying on this product for print management, especially those with complex internal networks or sensitive internal services, could face increased risk of internal network exposure and subsequent attacks if patches are not applied promptly.

Mitigation Recommendations

European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to at least version 25.1.102 for the appliance and 25.1.1413 for the application or later. If immediate patching is not feasible, network-level mitigations should be applied, including restricting outbound HTTP requests from the appliance to only trusted and necessary destinations, implementing strict egress filtering to prevent SSRF exploitation targeting internal IP ranges, and monitoring network traffic for unusual curl or HTTP request patterns originating from the appliance. Additionally, organizations should audit printer registration processes to detect anomalous hostnames and implement input validation or filtering on printer hostnames if possible. Enabling logging and alerting on suspicious internal requests triggered by the appliance can help detect exploitation attempts. Finally, segmenting the appliance network zone from critical internal services can limit the impact of SSRF attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb64b0d68cddf56c618

Added to database: 9/29/2025, 8:44:38 PM

Last enriched: 9/29/2025, 8:46:39 PM

Last updated: 9/29/2025, 8:46:39 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats