Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31625 | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. |
Tue, 18 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_host*:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Vasion virtual Appliance Host*
|
Mon, 17 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vasion virtual Appliance Host*
|
|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host*:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Vasion virtual Appliance Host*
|
Sat, 18 Oct 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. This vulnerability has been identified by the vendor as: V-2024-020 — Remote Code Execution. |
| Title | Vasion Print (formerly PrinterLogic) Unauthenticate Firmware Update Endpoint RCE | Vasion Print (formerly PrinterLogic) Unauthenticated Firmware Update Endpoint RCE |
Tue, 30 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
| Vendors & Products |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
Mon, 29 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (only VA deployments) expose an unauthenticated firmware-upload flow: a public page returns a signed token usable at va-api/v1/update, and every Docker image contains the appliance’s private GPG key and hard-coded passphrase. An attacker who extracts the key and obtains a token can decrypt, modify, re-sign, upload, and trigger malicious firmware, gaining remote code execution. | |
| Title | Vasion Print (formerly PrinterLogic) Unauthenticate Firmware Update Endpoint RCE | |
| Weaknesses | CWE-306 CWE-321 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:15:24.734Z
Reserved: 2025-04-15T19:15:22.572Z
Link: CVE-2025-34215
Updated: 2025-09-30T15:14:01.121Z
Status : Analyzed
Published: 2025-09-29T21:15:35.117
Modified: 2025-10-18T01:50:20.127
Link: CVE-2025-34215
No data.
OpenCVE Enrichment
Updated: 2025-09-30T08:47:50Z
EUVD