Cyber Posture

CVE-2025-34205

CriticalPublic PoC

Published: 19 September 2025

Published
19 September 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0651 91.2th percentile
Risk Priority 24 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34205 is a critical-severity Dead Code (CWE-561) vulnerability in Vasion Virtual Appliance Application. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 8.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and CM-7 (Least Functionality).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of authentication checks on the resetroot.php script, preventing unauthenticated attackers from resetting the MySQL root password.

prevent

Requires timely flaw remediation, such as upgrading to versions that remove the dangerous dead PHP code identified by the vendor.

prevent

Enforces least functionality by prohibiting unnecessary scripts and commented-out code like the deserialization in oses.php that could enable RCE.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

Unauthenticated access to resetroot.php enables exploitation of a public-facing application (T1190) to reset MySQL root credentials (T1212) and achieve privilege escalation to database administrator (T1068), potentially leading to RCE via deserialization.

NVD Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks…

more

authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise. This vulnerability has been identified by the vendor as: V-2023-003 — Dead / Insecure PHP Code.

Deeper analysisAI

CVE-2025-34205 affects Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application versions prior to 20.0.1923, impacting both VA and SaaS deployments. The vulnerability involves dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script at /var/www/app/resetroot.php lacks authentication checks and, when executed, performs a SQL update that sets the MySQL database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Additionally, commented-out code in /var/www/app/lib/common/oses.php unserializes session data (unserialize($_SESSION['osdata'])), a pattern that could enable remote code execution if re-enabled or reached with attacker-controlled serialized data. The issue is tracked by the vendor as V-2023-003 (Dead / Insecure PHP Code), with a CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and associated with CWE-561.

A remote attacker with network access to the affected endpoints, requiring no privileges or user interaction, can exploit this by directly invoking the resetroot.php script. This grants trivial reset of the MySQL root password to 'password', yielding full database control. When combined with the deserialization risks, exploitation can escalate to full remote code execution and complete system compromise across the Docker-hosted PHP environments.

Vendor security bulletins for SaaS and VA deployments, along with advisories from researchers such as Pierre Kim and VulnCheck, detail the issue and reference the vulnerable versions. Mitigation requires upgrading the Virtual Appliance Host to version 22.0.843 or later and the Application to 20.0.1923 or later to remove the dead code and address the risks.

Details

CWE(s)

Affected Products

vasion
virtual appliance application
≤ 20.0.1923
vasion
virtual appliance host
≤ 22.0.843

CVEs Like This One

CVE-2025-34224Same product: Vasion Virtual Appliance Application
CVE-2025-34215Same product: Vasion Virtual Appliance Application
CVE-2025-34216Same product: Vasion Virtual Appliance Application
CVE-2025-34223Same product: Vasion Virtual Appliance Application
CVE-2025-34218Same product: Vasion Virtual Appliance Application
CVE-2025-34204Same product: Vasion Virtual Appliance Application
CVE-2025-34203Same product: Vasion Virtual Appliance Application
CVE-2025-34225Same product: Vasion Virtual Appliance Application
CVE-2025-34221Same product: Vasion Virtual Appliance Application
CVE-2025-34228Same product: Vasion Virtual Appliance Application

References