Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34230: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host

0
Medium
VulnerabilityCVE-2025-34230cvecve-2025-34230cwe-306cwe-918
Published: Mon Sep 29 2025 (09/29/2025, 20:40:39 UTC)
Source: CVE Database V5
Vendor/Project: Vasion
Product: Print Virtual Appliance Host

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/hp/log_off_single_sign_on.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

AI-Powered Analysis

AILast updated: 10/06/2025, 20:48:21 UTC

Technical Analysis

CVE-2025-34230 is a server-side request forgery (SSRF) vulnerability affecting Vasion Print Virtual Appliance Host prior to version 25.1.102 and Application prior to 25.1.1413 in VA/SaaS deployments. The vulnerability exists in the /var/www/app/console_release/hp/log_off_single_sign_on.php script, which is accessible without authentication. When a printer is registered, its hostname is stored in the variable $printer_vo->str_host_address. Subsequently, the application constructs a URL in the form 'http://<host-address>:80/DevMgmt/DiscoveryTree.xml' and issues a curl request to this URL without any validation, whitelisting, or filtering to prevent requests to private or internal networks. This lack of input validation and missing authentication (CWE-306) allows an unauthenticated attacker to induce the server to make arbitrary HTTP requests to internal or external systems, effectively enabling blind SSRF (CWE-918). Although the attacker cannot directly view the response, they can use this technique to probe internal services, trigger internal actions, or gather intelligence about the internal network environment. The vulnerability has been confirmed as remediated, but the exact patch release date is unclear. The CVSS 4.0 base score is 6.9, reflecting network attack vector, no privileges or user interaction required, and low to medium impact on confidentiality and integrity. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, this vulnerability poses a risk of internal network reconnaissance and indirect exploitation through blind SSRF. Attackers can leverage the vulnerability to map internal services, potentially identifying further exploitable targets or sensitive internal endpoints. This could lead to lateral movement within the network or triggering unintended internal actions, impacting operational integrity. Organizations relying on Vasion Print appliances for centralized print management in enterprise or critical infrastructure environments may face increased risk of information leakage and disruption. The unauthenticated nature of the vulnerability increases its attractiveness to remote attackers. While direct data exfiltration is limited due to the blind nature of the SSRF, the intelligence gathered can facilitate more sophisticated attacks. The impact is heightened in environments where network segmentation is weak or where internal services lack robust authentication and access controls.

Mitigation Recommendations

1. Apply the latest patches from Vasion as soon as they are available and verify that the appliance is updated to version 25.1.102 or later, and the application to 25.1.1413 or later. 2. Restrict network access to the Vasion Print Virtual Appliance Host to trusted management networks only, using firewall rules and network segmentation to limit exposure. 3. Implement network-level SSRF protections such as egress filtering to block unauthorized outbound HTTP requests from the appliance to internal or sensitive network segments. 4. Monitor logs for unusual or unexpected outbound requests originating from the appliance, especially to internal IP ranges or uncommon ports. 5. Conduct internal network scans and audits to identify and secure any services that could be targeted via SSRF. 6. Enforce strict input validation and authentication controls on all management interfaces and scripts, ensuring critical functions require proper authorization. 7. Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to detect and block suspicious request patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68daefb64b0d68cddf56c618

Added to database: 9/29/2025, 8:44:38 PM

Last enriched: 10/6/2025, 8:48:21 PM

Last updated: 11/13/2025, 11:20:49 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats