CVE-2025-34223
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-29

Last updated on: 2025-10-09

Assigner: VulnCheck

Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-29
Last Modified
2025-10-09
Generated
2026-05-07
AI Q&A
2025-09-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vasion virtual_appliance_application to 20.0.2786 (exc)
vasion virtual_appliance_host to 22.0.1049 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-34223 is a critical vulnerability in Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application prior to certain versions. It involves a default admin account and an installation-time endpoint (/admin/query/update_database.php) that can be accessed without authentication. An attacker who can reach this installation web interface can send POST requests with arbitrary root_user and root_password values, replacing the default admin credentials with attacker-controlled ones. The script also contains hard-coded password hashes that allow bypassing password policy validation. This enables an unauthenticated remote attacker to gain full administrative control of the system during initial setup. [1]


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated remote attacker to gain full administrative control over the affected Vasion Print system. This means the attacker can compromise confidentiality, integrity, and availability of the system, potentially leading to unauthorized access, data manipulation, disruption of services, and complete system takeover. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the installation-time endpoint `/admin/query/update_database.php` is accessible without authentication on your Vasion Print (PrinterLogic) Virtual Appliance Host or Application. You can use network scanning tools or HTTP request commands to test this. For example, using curl: `curl -X POST http://<target-ip>/admin/query/update_database.php -d 'root_user=test&root_password=test' -v` to see if the endpoint accepts POST requests without authentication. Additionally, scanning for the presence of default admin accounts or weak credentials may help identify vulnerable systems. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later, as these versions address the vulnerability. Until upgrades can be applied, restrict network access to the installation endpoint `/admin/query/update_database.php` by firewall rules or network segmentation to prevent unauthenticated access. Also, verify and change any default or weak administrative credentials to strong, unique passwords. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart