Home

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product's network communications.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-29 | Updated 2025-09-30 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-798 Use of Hard-coded Credentials

CWE-522 Insufficiently Protected Credentials

Product status

Default status
unaffected

* before 25.1.102
affected

Default status
unaffected

* before 25.1.1413
affected

Credits

Pierre Barre finder

References

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

pierrekim.github.io/...-printerlogic-83-vulnerabilities.html technical-description

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

www.vulncheck.com/...c-ca-private-key-and-hardcoded-password third-party-advisory

cve.org (CVE-2025-34196)

nvd.nist.gov (CVE-2025-34196)

Download JSON