CVE-2025-34210

MEDIUM

Vasion Print Virtual Appliance Host & Application - Info Disclosure

Title source: llm

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 1.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-256
Status published

Affected Products (2)

vasion/virtual_appliance_application
vasion/virtual_appliance_host

Timeline

Published Oct 02, 2025
Tracked Since Feb 18, 2026