Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.2.169 and Application prior to version 25.2.1518 (VA/SaaS deployments) expose every internal Docker container to the network because firewall rules allow unrestricted traffic to the Docker bridge network. Because no authentication, ACL or client‑side identifier is required, the attacker can interact with any internal API, bypassing the product’s authentication mechanisms entirely. The result is unauthenticated remote access to internal services, allowing credential theft, configuration manipulation and potential remote code execution. This vulnerability has been identified by the vendor as: V-2025-002 — Authentication Bypass - Docker Instances.
References
| Link | Resource |
|---|---|
| https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/vasion-print-printerlogic-unrestriced-access-to-docker-bridge-network | Third Party Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Oct 2025, 18:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/vasion-print-printerlogic-unrestriced-access-to-docker-bridge-network - Third Party Advisory | |
| First Time |
Vasion virtual Appliance Application
Vasion virtual Appliance Host Vasion |
|
| CPE | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
30 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass - |
29 Sep 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 21:15
Updated : 2025-10-09 18:11
NVD link : CVE-2025-34221
Mitre link : CVE-2025-34221
CVE.ORG link : CVE-2025-34221
JSON object : View
Products Affected
vasion
- virtual_appliance_host
- virtual_appliance_application
CWE
CWE-306
Missing Authentication for Critical Function
