🔐 CVE Alert

CVE-2025-34224

UNKNOWN 0.0

Vasion Print (formerly PrinterLogic) Unauthenticated Device Modification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose a set of PHP scripts under the `console_release` directory without requiring authentication. An unauthenticated remote attacker can invoke these endpoints to re‑configure networked printers, add or delete RFID badge devices, or otherwise modify device settings. This vulnerability has been identified by the vendor as: V-2024-029 — No Authentication to Modify Devices.

CWE CWE-306
Vendor vasion
Product print virtual appliance host
Published Sep 29, 2025
Last Updated May 15, 2026
Stay Ahead of the Next One

Get instant alerts for vasion print virtual appliance host

Be the first to know when new unknown vulnerabilities affecting vasion print virtual appliance host are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Vasion / Print Virtual Appliance Host
0 < 22.0.1049
Vasion / Print Application
0 < 20.0.2786

References

NVD ↗ CVE.org ↗ EPSS Data ↗
pierrekim.github.io: https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-lack-of-auth-manage-printers help.printerlogic.com: https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm help.printerlogic.com: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm vulncheck.com: https://www.vulncheck.com/advisories/vasion-print-printerlogic-unauth-device-modification

Credits

Pierre Barre