CVE-2025-34200
HIGHVasion Virtual Appliance Application - Cleartext Storage
Title source: ruleDescription
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment.
References (4)
Scores
CVSS v3
7.8
EPSS
0.0003
EPSS Percentile
7.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-312
Status
published
Products (2)
vasion/virtual_appliance_application
vasion/virtual_appliance_host
Published
Sep 19, 2025
Tracked Since
Feb 18, 2026