CVE-2025-34221

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.2.169 and Application prior to version 25.2.1518 (VA/SaaS deployments) expose every internal Docker container to the network because firewall rules allow unrestricted traffic to the Docker bridge network. Because no authentication, ACL or client‑side identifier is required, the attacker can interact with any internal API, bypassing the product’s authentication mechanisms entirely. The result is unauthenticated remote access to internal services, allowing credential theft, configuration manipulation and potential remote code execution. This vulnerability has been identified by the vendor as: V-2025-002 — Authentication Bypass - Docker Instances.
CVSS

No CVSS.

Configurations

No configuration.

History

30 Sep 2025, 16:15

Type Values Removed Values Added
References () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass - () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-auth-bypass -

29 Sep 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-29 21:15

Updated : 2025-10-02 19:12


NVD link : CVE-2025-34221

Mitre link : CVE-2025-34221

CVE.ORG link : CVE-2025-34221


JSON object : View

Products Affected

No product.

CWE
CWE-306

Missing Authentication for Critical Function