Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 18 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*:* |
cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
Mon, 17 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vasion virtual Appliance Host*
|
Mon, 17 Nov 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vasion virtual Appliance Host*
|
|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host*:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Vasion virtual Appliance Host*
|
Thu, 09 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:-:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:-:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vasion
Vasion print Application Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
| Vendors & Products |
Vasion
Vasion print Application Vasion virtual Appliance Application Vasion virtual Appliance Host |
Thu, 02 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption." | |
| Title | Vasion Print (formerly PrinterLogic) Readable Cleartext Passwords | |
| Weaknesses | CWE-256 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T23:56:34.684Z
Reserved: 2025-04-15T19:15:22.571Z
Link: CVE-2025-34210
Updated: 2025-10-02T17:35:23.107Z
Status : Analyzed
Published: 2025-10-02T17:16:05.310
Modified: 2025-10-09T19:22:03.683
Link: CVE-2025-34210
No data.
OpenCVE Enrichment
Updated: 2025-10-03T08:22:41Z