Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-31624 | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.2.169 and Application prior to version 25.2.1518 (VA/SaaS deployments) expose every internal Docker container to the network because firewall rules allow unrestricted traffic to the Docker bridge network. Because no authentication, ACL or client‑side identifier is required, the attacker can interact with any internal API, bypassing the product’s authentication mechanisms entirely. The result is unauthenticated remote access to internal services, allowing credential theft, configuration manipulation and potential remote code execution. This vulnerability has been identified by the vendor as: V-2025-002 — Authentication Bypass - Docker Instances. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Tue, 30 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Vasion
         Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
|
| Vendors & Products | 
        
        Vasion
         Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
Mon, 29 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.2.169 and Application prior to version 25.2.1518 (VA/SaaS deployments) expose every internal Docker container to the network because firewall rules allow unrestricted traffic to the Docker bridge network. Because no authentication, ACL or client‑side identifier is required, the attacker can interact with any internal API, bypassing the product’s authentication mechanisms entirely. The result is unauthenticated remote access to internal services, allowing credential theft, configuration manipulation and potential remote code execution. This vulnerability has been identified by the vendor as: V-2025-002 — Authentication Bypass - Docker Instances. | |
| Title | Vasion Print (formerly PrinterLogic) | |
| Weaknesses | CWE-306 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-30T15:13:36.287Z
Reserved: 2025-04-15T19:15:22.574Z
Link: CVE-2025-34221
Updated: 2025-09-30T15:13:32.568Z
Status : Analyzed
Published: 2025-09-29T21:15:35.740
Modified: 2025-10-09T18:11:54.903
Link: CVE-2025-34221
No data.
                        OpenCVE Enrichment
                    Updated: 2025-09-30T08:47:43Z
 EUVD