CVE-2025-34188
BaseFortify
Publication date: 2025-09-19
Last updated on: 2025-10-02
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| vasion | virtual_appliance_application | to 20.0.1330 (exc) |
| vasion | virtual_appliance_host | to 1.0.735 (exc) |
| apple | macos | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-532 | The product writes sensitive information to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Vasion Print (formerly PrinterLogic) affects certain versions of its Virtual Appliance Host and Application for macOS/Linux clients. It involves the local logging mechanism storing authentication session tokens such as PHPSESSID, XSRF-TOKEN, and laravel_session in cleartext within log files that are world-readable. This means any local user with access to the machine can read these logs, extract the session tokens, and use them to authenticate remotely to the SaaS environment without needing normal login credentials, potentially leading to unauthorized access. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized system access because attackers or local users can obtain session tokens from readable log files and use them to bypass normal authentication. This can result in exposure of sensitive information and compromise of the SaaS environment associated with Vasion Print. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of world-readable log files on the affected Vasion Print Virtual Appliance Host or Application systems that contain authentication session tokens such as PHPSESSID, XSRF-TOKEN, and laravel_session in cleartext. On a Linux or macOS system, you can use commands like `ls -l` to identify log files with world-readable permissions and `grep` to search for session token strings within those logs. For example, run `ls -l /path/to/logs` to find log files with permissions like '-rw-r--r--' and then `grep -E 'PHPSESSID|XSRF-TOKEN|laravel_session' /path/to/logs/*` to detect exposed tokens. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access permissions on the log files to prevent world-readable access, ensuring that only authorized users can read these logs. Additionally, upgrade the Vasion Print Virtual Appliance Host to version 1.0.735 or later and the Print Application to version 20.0.1330 or later, as these versions address the vulnerability. Monitoring and rotating session tokens regularly can also reduce risk until patches are applied. [1]