CVE-2025-34204
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-19

Last updated on: 2025-09-24

Assigner: VulnCheck

Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) contains multiple Docker containers that run primary application processes (for example PHP workers, Node.js servers and custom binaries) as the root user. This increases the blast radius of a container compromise and enables lateral movement and host compromise when a container is breached.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-19
Last Modified
2025-09-24
Generated
2026-05-07
AI Q&A
2025-09-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vasion virtual_appliance_application *
vasion virtual_appliance_host *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-34204 is a high-severity vulnerability in Vasion Print (formerly PrinterLogic) where multiple Docker containers run critical application processes as the root user. This improper privilege management means that if an attacker compromises a container, they can gain elevated privileges, increasing the risk of further attacks such as lateral movement within the system and full host compromise. [1]


How can this vulnerability impact me? :

This vulnerability can lead to an attacker gaining elevated privileges inside Docker containers running Vasion Print processes. This increases the blast radius of a container breach, allowing the attacker to move laterally within the network and potentially compromise the entire host system, impacting confidentiality, integrity, and availability of the affected environment. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by inspecting Docker containers running on your system to check if any primary application processes (such as PHP workers, Node.js servers, or custom binaries) are running as the root user inside the containers. Commands like 'docker ps' to list running containers, followed by 'docker exec <container_id> ps aux' or 'docker exec <container_id> whoami' can help identify processes running as root. Additionally, checking Dockerfile or container configurations for user settings can help detect improper privilege management. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include reviewing and modifying Docker container configurations to ensure that application processes do not run as the root user inside containers. Implement the principle of least privilege by running processes with non-root users. Additionally, monitor for any unusual activity that might indicate container compromise and apply any available vendor patches or security bulletins once released. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart