CVE-2025-34198

9.8 CRITICAL

📋 TL;DR

Vasion Print (formerly PrinterLogic) appliances use the same hardcoded SSH host private keys across all installations instead of unique per-appliance keys. This allows attackers who obtain these keys to impersonate appliances, intercept SSH connections, and perform man-in-the-middle attacks against administrative sessions. All deployments using affected versions are vulnerable.

💻 Affected Systems

Products:
  • Vasion Print Virtual Appliance Host
  • Vasion Print Application
Versions: Virtual Appliance Host prior to 22.0.951, Application prior to 20.0.2368
Operating Systems: Appliance OS (Linux-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both VA (Virtual Appliance) and SaaS deployments. All installations share the same hardcoded keys.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of administrative SSH sessions, allowing attackers to gain full control over appliances, intercept sensitive data, and pivot to internal networks.

🟠

Likely Case

Attackers intercept administrative SSH sessions, capture credentials, and gain unauthorized access to appliance management interfaces.

🟢

If Mitigated

Limited impact if SSH access is restricted to trusted networks and monitored for unusual connections.

🌐 Internet-Facing: HIGH - Internet-facing appliances with SSH exposed are directly vulnerable to impersonation and MITM attacks.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this to compromise administrative sessions.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining the hardcoded private keys (available from compromised images) and network access to SSH services. No authentication needed once keys are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 22.0.951+, Application 20.0.2368+

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Update to patched versions via vendor update mechanism. 2. Regenerate SSH host keys on all appliances. 3. Restart SSH service or reboot appliances.

🔧 Temporary Workarounds

Regenerate SSH host keys manually

linux

Generate unique SSH host keys for each appliance to replace hardcoded keys

ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N ""
ssh-keygen -t ecdsa -f /etc/ssh/ssh_host_ecdsa_key -N ""
ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N ""
systemctl restart sshd

Restrict SSH access

linux

Limit SSH connections to trusted IP addresses using firewall rules

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Isolate appliances in separate network segments with strict access controls
  • Implement SSH certificate-based authentication instead of key-based

🔍 How to Verify

Check if Vulnerable:

Check SSH host key fingerprints against known hardcoded values or compare fingerprints across multiple appliances

Check Version:

Check appliance version in web interface or via vendor-specific commands

Verify Fix Applied:

Verify SSH host keys are unique per appliance and different from known hardcoded keys

📡 Detection & Monitoring

Log Indicators:

  • Multiple SSH connections from same source to different appliances
  • SSH key warnings in logs
  • Unexpected SSH host key changes

Network Indicators:

  • SSH traffic to appliances from unexpected sources
  • MITM patterns in SSH handshakes

SIEM Query:

source="ssh" AND (event="Failed publickey" OR event="Connection closed") | stats count by src_ip dest_ip

🔗 References

📤 Share & Export