CVE-2025-34224
Vasion Print (formerly PrinterLogic) Unauthenticated Device Modification
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose a set of PHP scripts under the `console_release` directory without requiring authentication. An unauthenticated remote attacker can invoke these endpoints to re‑configure networked printers, add or delete RFID badge devices, or otherwise modify device settings. This vulnerability has been identified by the vendor as: V-2024-029 — No Authentication to Modify Devices.
| CWE | CWE-306 |
| Vendor | vasion |
| Product | print virtual appliance host |
| Published | Sep 29, 2025 |
| Last Updated | May 15, 2026 |
Stay Ahead of the Next One
Get instant alerts for vasion print virtual appliance host
Be the first to know when new unknown vulnerabilities affecting vasion print virtual appliance host are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Vasion / Print Virtual Appliance Host
0 < 22.0.1049
Vasion / Print Application
0 < 20.0.2786
References
pierrekim.github.io: https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-lack-of-auth-manage-printers help.printerlogic.com: https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm help.printerlogic.com: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm vulncheck.com: https://www.vulncheck.com/advisories/vasion-print-printerlogic-unauth-device-modification
Credits
Pierre Barre