CVE-2025-34220
BaseFortify
Publication date: 2025-09-29
Last updated on: 2025-10-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vasion | virtual_appliance_application | to 25.1.1413 (exc) |
| vasion | virtual_appliance_host | to 25.1.102 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-34220 is a medium-severity vulnerability in Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application prior to certain versions. It involves an unauthenticated API endpoint (/api-gateway/identity/search-groups) that allows an attacker to remotely enumerate all group objects for a tenant without any authentication or user interaction. The exposed information includes internal identifiers such as group IDs, source service IDs, Azure AD object IDs, creation timestamps, and tenant IDs. This is due to missing authentication on a critical function (CWE-306). [1]
How can this vulnerability impact me? :
This vulnerability allows an unauthenticated remote attacker to access sensitive group information related to a tenant, including internal identifiers and metadata. Although the confidentiality impact is limited, this information disclosure could aid attackers in further targeting or reconnaissance activities against the affected environment. It may expose internal structure and identities that should remain confidential. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending unauthenticated HTTP requests to the /api-gateway/identity/search-groups endpoint on your Vasion Print (PrinterLogic) appliance or SaaS tenant URL. For example, you can use curl to test if the endpoint is accessible without authentication: curl -v https://<tenant>.printercloud10.com/api-gateway/identity/search-groups -H "Host: <tenant>" If the response returns group information including internal identifiers, the system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the Vasion Print Virtual Appliance Host to version 25.1.102 or later and the Print Application to version 25.1.1413 or later, as these versions contain the confirmed fix. Until the upgrade can be applied, restrict network access to the vulnerable API endpoint by firewall rules or network segmentation to prevent unauthenticated external access. [1]