{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-34224","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-04-15T19:15:22.574Z","datePublished":"2025-09-29T20:42:51.341Z","dateUpdated":"2025-11-17T23:56:36.592Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["console_release directory"],"product":"Print Virtual Appliance Host","vendor":"Vasion","versions":[{"lessThan":"22.0.1049","status":"affected","version":"*","versionType":"semver"}]},{"defaultStatus":"unaffected","modules":["console_release directory"],"product":"Print Application","vendor":"Vasion","versions":[{"lessThan":"20.0.2786","status":"affected","version":"*","versionType":"semver"}]}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*","versionEndExcluding":"22.0.1049"}]}]},{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*","versionEndExcluding":"20.0.2786"}]}]}],"credits":[{"lang":"en","type":"finder","value":"Pierre Barre"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049&nbsp;and Application prior to version 20.0.2786&nbsp;(VA/SaaS deployments) expose<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;a set of PHP scripts under the `console_release` directory without requiring authentication.  An unauthenticated remote attacker can invoke these endpoints to re‑configure networked printers, add or delete RFID badge devices, or otherwise modify device settings.&nbsp;</span>This vulnerability has been identified by the vendor as: V-2024-029 — No Authentication to Modify Devices.<br>"}],"value":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose a set of PHP scripts under the `console_release` directory without requiring authentication.  An unauthenticated remote attacker can invoke these endpoints to re‑configure networked printers, add or delete RFID badge devices, or otherwise modify device settings. This vulnerability has been identified by the vendor as: V-2024-029 — No Authentication to Modify Devices."}],"impacts":[{"capecId":"CAPEC-1","descriptions":[{"lang":"en","value":"CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"}]},{"capecId":"CAPEC-551","descriptions":[{"lang":"en","value":"CAPEC-551 Modify Existing Service"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":10,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2025-11-17T23:56:36.592Z"},"references":[{"tags":["technical-description"],"url":"https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-lack-of-auth-manage-printers"},{"tags":["vendor-advisory","patch"],"url":"https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"},{"tags":["vendor-advisory","patch"],"url":"https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"},{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/vasion-print-printerlogic-unauth-device-modification"}],"source":{"discovery":"INTERNAL"},"title":"Vasion Print (formerly PrinterLogic) Unauthenticated Device Modification","x_generator":{"engine":"vulncheck"}},"adp":[{"references":[{"url":"https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-lack-of-auth-manage-printers","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-30T15:20:03.213544Z","id":"CVE-2025-34224","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-30T15:20:19.336Z"}}]}}