Vulnerabilities (CVE)

Filtered by vendor Vasion Subscribe
Filtered by product Virtual Appliance Host
Total 43 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-34201 1 Vasion 2 Virtual Appliance Application, Virtual Appliance Host 2025-09-24 N/A 7.8 HIGH
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) run many Docker containers on shared internal networks without firewalling or segmentation between instances. A compromise of any single container allows direct access to internal services (HTTP, Redis, MySQL, etc.) on the overlay network. From a compromised container, an attacker can reach and exploit other services, enabling lateral movement, data theft, and system-wide compromise.
CVE-2025-34200 1 Vasion 2 Virtual Appliance Application, Virtual Appliance Host 2025-09-24 N/A 7.8 HIGH
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment.
CVE-2025-34206 1 Vasion 2 Virtual Appliance Application, Virtual Appliance Host 2025-09-24 N/A 9.8 CRITICAL
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) mount host configuration and secret material under /var/www/efs_storage into many Docker containers with overly-permissive filesystem permissions. Files such as secrets.env, GPG-encrypted blobs in .secrets, MySQL client keys, and application session files are accessible from multiple containers. An attacker who controls or reaches any container can read or modify these artifacts, leading to credential theft, RCE via Laravel APP_KEY, Portainer takeover, and full compromise.