Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:-:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:-:*:*:*:*:*:*:*  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Vasion
         Vasion print Application Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
|
| Vendors & Products | 
        
        Vasion
         Vasion print Application Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
Thu, 02 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 02 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption." | |
| Title | Vasion Print (formerly PrinterLogic) Readable Cleartext Passwords | |
| Weaknesses | CWE-256 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-02T17:38:45.120Z
Reserved: 2025-04-15T19:15:22.571Z
Link: CVE-2025-34210
Updated: 2025-10-02T17:35:23.107Z
Status : Analyzed
Published: 2025-10-02T17:16:05.310
Modified: 2025-10-09T19:22:03.683
Link: CVE-2025-34210
No data.
                        OpenCVE Enrichment
                    Updated: 2025-10-03T08:22:41Z