Home

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

PUBLISHED Reserved 2025-04-15 | Published 2025-10-02 | Updated 2025-10-02 | Assigner VulnCheck




CRITICAL: 9.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-256: Plaintext Storage of a Password

Product status

Default status
unknown

*
affected

Default status
unknown

*
affected

Credits

Pierre Barre finder

References

pierrekim.github.io/...-printerlogic-83-vulnerabilities.html technical-description

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

www.vulncheck.com/...rinterlogic-readble-cleartext-passwords third-party-advisory

cve.org (CVE-2025-34210)

nvd.nist.gov (CVE-2025-34210)

Download JSON