CVE-2025-34198
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-19

Last updated on: 2025-10-02

Assigner: VulnCheck

Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951 and Application prior to 20.0.2368 (VA and SaaS deployments) contain shared, hardcoded SSH host private keys in the appliance image. The same private host keys (RSA, ECDSA, and ED25519) are present across installations, rather than being uniquely generated per appliance. An attacker who obtains these private keys (for example from one compromised appliance image or another installation) can impersonate the appliance, decrypt or intercept SSH connections to appliances that use the same keys, and perform man-in-the-middle or impersonation attacks against administrative SSH sessions.Β This vulnerability has been identified by the vendor as: V-2024-011 β€” Hardcoded SSH Host Key.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-19
Last Modified
2025-10-02
Generated
2026-05-07
AI Q&A
2025-09-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vasion virtual_appliance_application to 20.0.2368 (exc)
vasion virtual_appliance_host to 22.0.951 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application versions containing shared, hardcoded SSH host private keys embedded in the appliance image. These private keys (RSA, ECDSA, and ED25519) are identical across different installations instead of being uniquely generated per appliance. An attacker who obtains these keys can impersonate the appliance, decrypt or intercept SSH connections, and perform man-in-the-middle or impersonation attacks against administrative SSH sessions without needing privileges or user interaction. [1]


How can this vulnerability impact me? :

The vulnerability can allow an attacker to remotely gain unauthorized access to affected systems by impersonating the appliance or intercepting SSH connections. This can lead to compromise of confidentiality and integrity of administrative SSH sessions, enabling man-in-the-middle attacks or unauthorized control over the appliance. The attack requires no privileges or user interaction and has a high impact on confidentiality and integrity. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Vasion Print Virtual Appliance Host to version 22.0.951 or later and the Print Application to version 20.0.2368 or later, as these versions address the issue by removing the shared hardcoded SSH host private keys. Additionally, replacing the SSH host keys with unique keys per appliance and reviewing SSH access logs for suspicious activity are recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart