CVE-2025-34234

7.5 HIGH

📋 TL;DR

Vasion Print (formerly PrinterLogic) contains hardcoded encryption keys in its application containers, allowing attackers who can access the filesystem to decrypt sensitive SaaS identifiers. This affects Virtual Appliance Host versions before 25.1.102 and Application versions before 25.1.1413 in VA/SaaS deployments. The vulnerability enables decryption of encrypted external identifiers used by the system.

💻 Affected Systems

Products:
  • Vasion Print Virtual Appliance Host
  • Vasion Print Application
Versions: Virtual Appliance Host prior to 25.1.102, Application prior to 25.1.1413
Operating Systems: Linux (containerized deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects VA and SaaS deployments using Docker containers printerlogic/pi, printerlogic/printer-admin-api, and printercloud/pi

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers decrypt all SaaS identifiers, potentially enabling unauthorized access to external systems, data exfiltration, or lateral movement within connected environments.

🟠

Likely Case

Attackers with filesystem access decrypt SaaS identifiers to map infrastructure relationships or prepare for further attacks on connected systems.

🟢

If Mitigated

With proper access controls, impact is limited to information disclosure about system identifiers without direct system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires filesystem access to read the hardcoded keys, which typically requires some level of system access or container escape

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Virtual Appliance Host 25.1.102+, Application 25.1.1413+

Vendor Advisory: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm

Restart Required: Yes

Instructions:

1. Update to Virtual Appliance Host version 25.1.102 or later
2. Update to Application version 25.1.1413 or later
3. Restart affected containers
4. Verify keys are no longer present in /var/www/app/config/

🔧 Temporary Workarounds

Remove hardcoded keys manually

linux

Manually delete the hardcoded key files from the filesystem

rm -f /var/www/app/config/keyfile.ppk.dev
rm -f /var/www/app/config/keyfile.saasid.ppk.dev

Restrict filesystem access

linux

Implement strict filesystem permissions to prevent unauthorized access to configuration directories

chmod 600 /var/www/app/config/*
chown root:root /var/www/app/config/*

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized filesystem access to containers
  • Monitor for unauthorized access attempts to configuration directories and key files

🔍 How to Verify

Check if Vulnerable:

Check if key files exist: ls -la /var/www/app/config/keyfile*.ppk.dev

Check Version:

Check container version through application interface or docker inspect

Verify Fix Applied:

Verify key files are removed and check application version meets patched requirements

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /var/www/app/config/ directory
  • File read operations on keyfile.ppk.dev or keyfile.saasid.ppk.dev

Network Indicators:

  • Unusual outbound connections following configuration file access

SIEM Query:

source="vasion-print" AND (file_path="/var/www/app/config/keyfile" OR event="file_read")

🔗 References

📤 Share & Export