CVE-2025-34230: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/hp/log_off_single_sign_on.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
AI Analysis
Technical Summary
CVE-2025-34230 is a medium-severity vulnerability affecting the Vasion Print Virtual Appliance Host and Application (formerly PrinterLogic) in versions prior to 25.1.102 and 25.1.1413 respectively. The vulnerability is a blind server-side request forgery (SSRF) flaw caused by missing authentication controls on a critical function accessible via the /var/www/app/console_release/hp/log_off_single_sign_on.php script. An unauthenticated attacker can exploit this by registering a printer with a crafted hostname. The software stores this hostname in the variable $printer_vo->str_host_address and later constructs a URL such as 'http://<host-address>:80/DevMgmt/DiscoveryTree.xml' which it requests using curl without any validation, whitelisting, or filtering against private/internal network addresses. Because the SSRF is blind, the attacker cannot directly see the response data but can use the vulnerability to probe internal services, trigger internal actions, or gather intelligence about the internal network environment. This can facilitate further attacks such as internal network reconnaissance or pivoting. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-918 (Server-Side Request Forgery). The CVSS 4.0 base score is 6.9, reflecting network attack vector, no privileges or user interaction required, and low to medium impact on confidentiality and integrity. Although a fix has been confirmed, the exact patch introduction date is unclear, and no public exploits are currently known. The vulnerability affects all versions prior to the fixed releases, indicating a broad exposure for deployments not yet updated.
Potential Impact
For European organizations using Vasion Print Virtual Appliance Host, this vulnerability poses a significant risk to internal network security. Since the appliance is often deployed in enterprise printing environments, exploitation could allow attackers to bypass perimeter defenses and access internal services that are otherwise inaccessible externally. This can lead to reconnaissance of sensitive internal infrastructure, potential triggering of unintended internal operations, and gathering of intelligence that could facilitate lateral movement or further compromise. Confidentiality and integrity of internal systems may be impacted, although availability impact is low. The unauthenticated nature of the vulnerability increases risk, as attackers do not need valid credentials or user interaction. Organizations in Europe relying on this product for print management, especially those with complex internal networks or sensitive internal services, could face increased risk of internal network exposure and subsequent attacks if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to at least version 25.1.102 for the appliance and 25.1.1413 for the application or later. If immediate patching is not feasible, network-level mitigations should be applied, including restricting outbound HTTP requests from the appliance to only trusted and necessary destinations, implementing strict egress filtering to prevent SSRF exploitation targeting internal IP ranges, and monitoring network traffic for unusual curl or HTTP request patterns originating from the appliance. Additionally, organizations should audit printer registration processes to detect anomalous hostnames and implement input validation or filtering on printer hostnames if possible. Enabling logging and alerting on suspicious internal requests triggered by the appliance can help detect exploitation attempts. Finally, segmenting the appliance network zone from critical internal services can limit the impact of SSRF attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-34230: CWE-306 Missing Authentication for Critical Function in Vasion Print Virtual Appliance Host
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/hp/log_off_single_sign_on.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
AI-Powered Analysis
Technical Analysis
CVE-2025-34230 is a medium-severity vulnerability affecting the Vasion Print Virtual Appliance Host and Application (formerly PrinterLogic) in versions prior to 25.1.102 and 25.1.1413 respectively. The vulnerability is a blind server-side request forgery (SSRF) flaw caused by missing authentication controls on a critical function accessible via the /var/www/app/console_release/hp/log_off_single_sign_on.php script. An unauthenticated attacker can exploit this by registering a printer with a crafted hostname. The software stores this hostname in the variable $printer_vo->str_host_address and later constructs a URL such as 'http://<host-address>:80/DevMgmt/DiscoveryTree.xml' which it requests using curl without any validation, whitelisting, or filtering against private/internal network addresses. Because the SSRF is blind, the attacker cannot directly see the response data but can use the vulnerability to probe internal services, trigger internal actions, or gather intelligence about the internal network environment. This can facilitate further attacks such as internal network reconnaissance or pivoting. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-918 (Server-Side Request Forgery). The CVSS 4.0 base score is 6.9, reflecting network attack vector, no privileges or user interaction required, and low to medium impact on confidentiality and integrity. Although a fix has been confirmed, the exact patch introduction date is unclear, and no public exploits are currently known. The vulnerability affects all versions prior to the fixed releases, indicating a broad exposure for deployments not yet updated.
Potential Impact
For European organizations using Vasion Print Virtual Appliance Host, this vulnerability poses a significant risk to internal network security. Since the appliance is often deployed in enterprise printing environments, exploitation could allow attackers to bypass perimeter defenses and access internal services that are otherwise inaccessible externally. This can lead to reconnaissance of sensitive internal infrastructure, potential triggering of unintended internal operations, and gathering of intelligence that could facilitate lateral movement or further compromise. Confidentiality and integrity of internal systems may be impacted, although availability impact is low. The unauthenticated nature of the vulnerability increases risk, as attackers do not need valid credentials or user interaction. Organizations in Europe relying on this product for print management, especially those with complex internal networks or sensitive internal services, could face increased risk of internal network exposure and subsequent attacks if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately verify their Vasion Print Virtual Appliance Host and Application versions and upgrade to at least version 25.1.102 for the appliance and 25.1.1413 for the application or later. If immediate patching is not feasible, network-level mitigations should be applied, including restricting outbound HTTP requests from the appliance to only trusted and necessary destinations, implementing strict egress filtering to prevent SSRF exploitation targeting internal IP ranges, and monitoring network traffic for unusual curl or HTTP request patterns originating from the appliance. Additionally, organizations should audit printer registration processes to detect anomalous hostnames and implement input validation or filtering on printer hostnames if possible. Enabling logging and alerting on suspicious internal requests triggered by the appliance can help detect exploitation attempts. Finally, segmenting the appliance network zone from critical internal services can limit the impact of SSRF attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.574Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68daefb64b0d68cddf56c618
Added to database: 9/29/2025, 8:44:38 PM
Last enriched: 9/29/2025, 8:46:39 PM
Last updated: 9/29/2025, 8:46:39 PM
Views: 2
Related Threats
CVE-2025-43818: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-43815: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-30247: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Western Digital My Cloud
CriticalCVE-2025-34235: CWE-295 Improper Certificate Validation in Vasion Print Virtual Appliance Host
CriticalCVE-2025-34233: CWE‑693 Protection Mechanism Failure in Vasion Print Virtual Appliance Host
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.