Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.1049 and Application prior to 20.0.2786 (VA and SaaS deployments) configure the SSH client within Docker instances with the following options: `UserKnownHostsFile=/dev/null`, `StrictHostKeyChecking=no`, and `ForwardAgent yes`. These settings disable verification of the remote host’s SSH key and automatically forward the developer’s SSH‑agent to any host that matches the configured wildcard patterns. As a result, an attacker who can reach a single compromised container can cause the container to connect to a malicious SSH server, capture the forwarded private keys, and use those keys for unrestricted lateral movement across the environment.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
Vendors & Products |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
Mon, 29 Sep 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.1049 and Application prior to 20.0.2786 (VA and SaaS deployments) configure the SSH client within Docker instances with the following options: `UserKnownHostsFile=/dev/null`, `StrictHostKeyChecking=no`, and `ForwardAgent yes`. These settings disable verification of the remote host’s SSH key and automatically forward the developer’s SSH‑agent to any host that matches the configured wildcard patterns. As a result, an attacker who can reach a single compromised container can cause the container to connect to a malicious SSH server, capture the forwarded private keys, and use those keys for unrestricted lateral movement across the environment. | |
Title | Vasion Print (formerly PrinterLogic) Insecure SSH Client Configuration | |
Weaknesses | CWE-306 CWE-522 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-09-29T20:38:29.682Z
Updated: 2025-09-30T13:42:46.177Z
Reserved: 2025-04-15T19:15:22.571Z
Link: CVE-2025-34207

Updated: 2025-09-30T13:33:25.999Z

Status : Received
Published: 2025-09-29T21:15:34.147
Modified: 2025-09-30T14:15:37.927
Link: CVE-2025-34207

No data.