Home

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.2.169 and Application prior to version 25.2.1518 (VA/SaaS deployments) expose every internal Docker container to the network because firewall rules allow unrestricted traffic to the Docker bridge network. Because no authentication, ACL or client‑side identifier is required, the attacker can interact with any internal API, bypassing the product’s authentication mechanisms entirely. The result is unauthenticated remote access to internal services, allowing credential theft, configuration manipulation and potential remote code execution. This vulnerability has been identified by the vendor as: V-2025-002 — Authentication Bypass - Docker Instances.

PUBLISHED Reserved 2025-04-15 | Published 2025-09-29 | Updated 2025-09-30 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

* before 25.2.169
affected

Default status
unaffected

* before 25.2.1518
affected

Credits

Pierre Barre finder

References

pierrekim.github.io/...-printerlogic-83-vulnerabilities.html technical-description

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

help.printerlogic.com/...int/Security/Security-Bulletins.htm vendor-advisory patch

www.vulncheck.com/...striced-access-to-docker-bridge-network third-party-advisory

cve.org (CVE-2025-34221)

nvd.nist.gov (CVE-2025-34221)

Download JSON