Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.862 and Application prior to 20.0.2014 (VA and SaaS deployments) contain Docker images with the private GPG key and passphrase for the account *no‑reply+virtual‑[email protected]*. The key is stored in cleartext and the passphrase is hardcoded in files. An attacker with administrative access to the appliance can extract the private key, import it into their own system, and subsequently decrypt GPG-encrypted files and sign arbitrary firmware update packages. A maliciously signed update can be uploaded by an admin‑level attacker and will be executed by the appliance, giving the attacker full control of the virtual appliance.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
|
Vendors & Products |
Vasion
Vasion virtual Appliance Application Vasion virtual Appliance Host |
Mon, 29 Sep 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 22.0.862 and Application prior to 20.0.2014 (VA and SaaS deployments) contain Docker images with the private GPG key and passphrase for the account *no‑reply+virtual‑[email protected]*. The key is stored in cleartext and the passphrase is hardcoded in files. An attacker with administrative access to the appliance can extract the private key, import it into their own system, and subsequently decrypt GPG-encrypted files and sign arbitrary firmware update packages. A maliciously signed update can be uploaded by an admin‑level attacker and will be executed by the appliance, giving the attacker full control of the virtual appliance. | |
Title | Vasion Print (formerly PrinterLogic) Hardcoded GPG Private Key | |
Weaknesses | CWE-798 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-09-29T20:35:11.366Z
Updated: 2025-09-30T13:43:11.932Z
Reserved: 2025-04-15T19:15:22.571Z
Link: CVE-2025-34209

Updated: 2025-09-30T13:34:01.109Z

Status : Received
Published: 2025-09-29T21:15:34.447
Modified: 2025-09-30T14:15:38.077
Link: CVE-2025-34209

No data.