{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-34209","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-04-15T19:15:22.571Z","datePublished":"2025-09-29T20:35:11.366Z","dateUpdated":"2025-11-17T23:56:34.498Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Docker images – embedded GPG key pair","Firmware‑update signing workflow"],"product":"Print Virtual Appliance Host","vendor":"Vasion","versions":[{"lessThan":"22.0.862","status":"affected","version":"*","versionType":"semver"}]},{"defaultStatus":"unaffected","modules":["Docker images – embedded GPG key pair","Firmware‑update signing workflow"],"product":"Print Application","vendor":"Vasion","versions":[{"lessThan":"20.0.2014","status":"affected","version":"*","versionType":"semver"}]}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*","versionEndExcluding":"22.0.862"}]}]},{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*","versionEndExcluding":"20.0.2014"}]}]}],"credits":[{"lang":"en","type":"finder","value":"Pierre Barre"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.862 and Application prior to 20.0.2014 (VA and SaaS deployments)&nbsp;contain Docker images with the private GPG key and passphrase for the account *no‑reply+virtual‑appliance@printerlogic.com*.&nbsp;The key is stored in cleartext and the passphrase is hardcoded in files.&nbsp;An attacker with administrative access to the appliance can extract the private key, import it into their own system, and subsequently decrypt GPG-encrypted files and sign arbitrary firmware update packages.&nbsp;A maliciously signed update can be uploaded by an admin‑level attacker and will be executed by the appliance, giving the attacker full control of the virtual appliance.&nbsp;This vulnerability has been identified by the vendor as: V-2023-010 — Hardcoded Private Key.<br>"}],"value":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.862 and Application prior to 20.0.2014 (VA and SaaS deployments) contain Docker images with the private GPG key and passphrase for the account *no‑reply+virtual‑appliance@printerlogic.com*. The key is stored in cleartext and the passphrase is hardcoded in files. An attacker with administrative access to the appliance can extract the private key, import it into their own system, and subsequently decrypt GPG-encrypted files and sign arbitrary firmware update packages. A maliciously signed update can be uploaded by an admin‑level attacker and will be executed by the appliance, giving the attacker full control of the virtual appliance. This vulnerability has been identified by the vendor as: V-2023-010 — Hardcoded Private Key."}],"impacts":[{"capecId":"CAPEC-474","descriptions":[{"lang":"en","value":"CAPEC-474 Signature Spoofing by Key Theft"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.4,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-798","description":"CWE-798 Use of Hard-coded Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2025-11-17T23:56:34.498Z"},"references":[{"tags":["technical-description"],"url":"https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-private-gpg-key"},{"tags":["vendor-advisory","patch"],"url":"https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"},{"tags":["vendor-advisory","patch"],"url":"https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"},{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/vasion-print-printerlogic-hardcoded-gpg-private-key"}],"source":{"discovery":"INTERNAL"},"title":"Vasion Print (formerly PrinterLogic) Hardcoded GPG Private Key","x_generator":{"engine":"vulncheck"}},"adp":[{"references":[{"url":"https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-private-gpg-key","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-30T13:33:57.998509Z","id":"CVE-2025-34209","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-30T13:43:11.932Z"}}]}}