Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 19 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 19 Sep 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment. | |
Title | Vasion Print (formerly PrinterLogic) Network Account Password Stored in Cleartext | |
Weaknesses | CWE-312 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-19T20:05:40.367Z
Reserved: 2025-04-15T19:15:22.570Z
Link: CVE-2025-34200

Updated: 2025-09-19T20:05:35.291Z

Status : Received
Published: 2025-09-19T19:15:40.737
Modified: 2025-09-19T19:15:40.737
Link: CVE-2025-34200

No data.

No data.