Vulnerability in Vasion Print Virtual Appliance Host and Application Exposes Internal Docker Containers
CVE-2025-34218

10CRITICAL

Key Information:

Vendor

Vasion

Vendor
CVE Published:
29 September 2025

What is CVE-2025-34218?

The Vasion Print products have a significant vulnerability that allows unauthorized users to access internal Docker containers via an unsecured API gateway. This issue arises from the absence of authentication, access control lists (ACLs), and network restrictions on the gateway's proxy, effectively exposing micro-service containers to potential attackers. With this exposure, malicious actors can enumerate all internal services, interact with the APIs without authentication, and execute harmful requests. This could lead to serious security breaches, including information disclosure, privilege escalation, or denial-of-service attacks on the appliance. The security advisory from Vasion highlights this vulnerability as V-2024-030, emphasizing the need for immediate patches and protective measures.

Affected Version(s)

Print Application * < 20.0.2786

Print Virtual Appliance Host * < 22.0.1049

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pierre Barre
.
CVE-2025-34218 : Vulnerability in Vasion Print Virtual Appliance Host and Application Exposes Internal Docker Containers