Insecure Installation Credentials in Vasion Print by PrinterLogic
CVE-2025-34223

10CRITICAL

Key Information:

Vendor

Vasion

Vendor
CVE Published:
29 September 2025

What is CVE-2025-34223?

Vasion Print, by PrinterLogic, is vulnerable due to the presence of a default admin account and an installation-time endpoint accessible without authentication. This allows an attacker with access to the installation web interface to execute a POST request with arbitrary root_user and root_password values. Consequently, this action can replace default admin credentials with those controlled by the attacker. The vulnerability is exacerbated by hard-coded SHA-512 and SHA-1 hashes of the default password, facilitating a bypass of password policy checks. As a result, an unauthenticated remote attacker can gain complete administrative control of the system during its initial setup.

Affected Version(s)

Print Application * < 20.0.2786

Print Virtual Appliance Host * < 22.0.1049

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pierre Barre
.
CVE-2025-34223 : Insecure Installation Credentials in Vasion Print by PrinterLogic