Home

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) run many Docker containers on shared internal networks without firewalling or segmentation between instances. A compromise of any single container allows direct access to internal services (HTTP, Redis, MySQL, etc.) on the overlay network. From a compromised container, an attacker can reach and exploit other services, enabling lateral movement, data theft, and system-wide compromise.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-19 | Updated 2025-09-29 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-653 Improper Isolation or Compartmentalization

Product status

Default status
unknown

* (semver)
affected

Default status
unknown

* (semver)
affected

Credits

Pierre Barre finder

References

pierrekim.github.io/...-printerlogic-83-vulnerabilities.html technical-description

help.printerlogic.com/...int/Security/Security-Bulletins.htm product

help.printerlogic.com/...int/Security/Security-Bulletins.htm product

www.vulncheck.com/...k-segmentation-between-docker-instances third-party-advisory

cve.org (CVE-2025-34201)

nvd.nist.gov (CVE-2025-34201)

Download JSON