Cyber Posture

CVE-2025-34204

CriticalPublic PoC

Published: 19 September 2025

Published
19 September 2025
Modified
24 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34204 is a critical-severity Improper Privilege Management (CWE-269) vulnerability in Vasion Virtual Appliance Application. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 42.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces least privilege by requiring Docker container processes like PHP workers and Node.js servers to run as non-root users, directly mitigating the improper privilege management that expands blast radius upon compromise.

prevent

Mandates secure configuration settings for Docker containers to prohibit running primary application processes as root, addressing the core misconfiguration enabling lateral movement and host compromise.

prevent

Limits system functionality to essentials, reducing the capabilities available to compromised root processes in containers and thereby constraining potential impact and lateral movement.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
Why these techniques?

Processes running as root in Docker containers enable privilege escalation via exploitation (T1068) upon container compromise and facilitate escape to host (T1611) due to elevated privileges allowing host access and lateral movement.

NVD Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) contains multiple Docker containers that run primary application processes (for example PHP workers, Node.js servers and custom binaries) as the root user. This increases the blast radius…

more

of a container compromise and enables lateral movement and host compromise when a container is breached.

Deeper analysisAI

CVE-2025-34204 affects Vasion Print, formerly known as PrinterLogic, specifically its Virtual Appliance Host and Application in both VA and SaaS deployments. The vulnerability involves multiple Docker containers that execute primary application processes, such as PHP workers, Node.js servers, and custom binaries, with root user privileges. This misconfiguration, classified under CWE-269 (Improper Privilege Management), significantly expands the potential impact of any container breach, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Attackers require only network access with no authentication or user interaction, allowing remote exploitation over the network with low complexity. A successful container compromise grants root privileges within that container, enabling attackers to escalate impact through lateral movement across containers and full host system compromise, resulting in high confidentiality, integrity, and availability disruptions.

Vendor security bulletins for SaaS and VA deployments are available at PrinterLogic's help sites, alongside detailed analyses from independent researchers and VulnCheck, which highlight the root process issue in Docker instances. These resources provide guidance on affected versions and recommended mitigations, though specific patch details are outlined in the advisories.

Details

CWE(s)

Affected Products

vasion
virtual appliance application
all versions
vasion
virtual appliance host
all versions

CVEs Like This One

CVE-2025-34205Same product: Vasion Virtual Appliance Application
CVE-2025-34206Same product: Vasion Virtual Appliance Application
CVE-2025-34218Same product: Vasion Virtual Appliance Application
CVE-2025-34216Same product: Vasion Virtual Appliance Application
CVE-2025-34224Same product: Vasion Virtual Appliance Application
CVE-2025-34202Same product: Vasion Virtual Appliance Application
CVE-2025-34228Same product: Vasion Virtual Appliance Application
CVE-2025-34222Same product: Vasion Virtual Appliance Application
CVE-2025-34221Same product: Vasion Virtual Appliance Application
CVE-2025-34215Same product: Vasion Virtual Appliance Application

References