CVE-2025-34223
BaseFortify
Publication date: 2025-09-29
Last updated on: 2025-10-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vasion | virtual_appliance_application | to 20.0.2786 (exc) |
| vasion | virtual_appliance_host | to 22.0.1049 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-34223 is a critical vulnerability in Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application prior to certain versions. It involves a default admin account and an installation-time endpoint (/admin/query/update_database.php) that can be accessed without authentication. An attacker who can reach this installation web interface can send POST requests with arbitrary root_user and root_password values, replacing the default admin credentials with attacker-controlled ones. The script also contains hard-coded password hashes that allow bypassing password policy validation. This enables an unauthenticated remote attacker to gain full administrative control of the system during initial setup. [1]
How can this vulnerability impact me? :
This vulnerability allows an unauthenticated remote attacker to gain full administrative control over the affected Vasion Print system. This means the attacker can compromise confidentiality, integrity, and availability of the system, potentially leading to unauthorized access, data manipulation, disruption of services, and complete system takeover. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the installation-time endpoint `/admin/query/update_database.php` is accessible without authentication on your Vasion Print (PrinterLogic) Virtual Appliance Host or Application. You can use network scanning tools or HTTP request commands to test this. For example, using curl: `curl -X POST http://<target-ip>/admin/query/update_database.php -d 'root_user=test&root_password=test' -v` to see if the endpoint accepts POST requests without authentication. Additionally, scanning for the presence of default admin accounts or weak credentials may help identify vulnerable systems. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the Vasion Print Virtual Appliance Host to version 22.0.1049 or later and the Application to version 20.0.2786 or later, as these versions address the vulnerability. Until upgrades can be applied, restrict network access to the installation endpoint `/admin/query/update_database.php` by firewall rules or network segmentation to prevent unauthenticated access. Also, verify and change any default or weak administrative credentials to strong, unique passwords. [1]