Cyber Posture

CVE-2025-34223

CriticalPublic PoC

Published: 29 September 2025

Published
29 September 2025
Modified
09 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0247 85.4th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34223 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Vasion Virtual Appliance Application. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked in the top 14.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 explicitly prohibits permitted actions without identification or authentication for critical functions like the unauthenticated endpoint that allows overwriting admin credentials.

prevent

IA-5 mandates changing default authenticators prior to first use and ensuring sufficient strength of mechanism, directly addressing hard-coded default credentials and bypassable password policies.

prevent

AC-2 requires proper management of accounts including disabling defaults and monitoring usage, mitigating risks from persistent default admin accounts during and post-initial setup.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated access to installation endpoint enables overwriting default admin credentials, facilitating exploitation of public-facing application (T1190) and leveraging default accounts (T1078.001) for full administrative control.

NVD Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can…

more

reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.

Deeper analysisAI

CVE-2025-34223 is a critical vulnerability in Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1049 and Application versions prior to 20.0.2786, affecting VA/SaaS deployments. It stems from a default admin account paired with an unauthenticated installation-time endpoint at /admin/query/update_database.php. This endpoint allows attackers to POST arbitrary root_user and root_password values, overwriting the default admin credentials with attacker-controlled ones. The script includes hard-coded SHA-512 and SHA-1 hashes of the default password, enabling bypass of password-policy validation. The issue is tracked by the vendor as V-2024-022 — Insecure Installation Credentials, with associated CWEs-306 (Missing Authentication for Critical Function) and CWE-798 (Use of Hard-coded Credentials), and a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

An unauthenticated remote attacker who can reach the installation web interface can exploit this vulnerability during the initial setup phase to gain full administrative control of the system. No privileges, user interaction, or special conditions are required beyond network access to the endpoint.

Vendor security bulletins for SaaS and VA deployments detail the issue and are available at PrinterLogic's help sites. Additional analysis appears in advisories from VulnCheck and researcher Pierre Kim's blog, which covers this as part of 83 vulnerabilities in Vasion/PrinterLogic products.

This vulnerability was publicly disclosed on 2025-09-29 alongside researcher findings on broader insecure credential handling in the platform. No evidence of real-world exploitation is noted in available details.

Details

CWE(s)

Affected Products

vasion
virtual appliance application
≤ 20.0.2786
vasion
virtual appliance host
≤ 22.0.1049

CVEs Like This One

CVE-2025-34224Same product: Vasion Virtual Appliance Application
CVE-2025-34215Same product: Vasion Virtual Appliance Application
CVE-2025-34221Same product: Vasion Virtual Appliance Application
CVE-2025-34216Same product: Vasion Virtual Appliance Application
CVE-2025-34218Same product: Vasion Virtual Appliance Application
CVE-2025-34225Same product: Vasion Virtual Appliance Application
CVE-2025-34228Same product: Vasion Virtual Appliance Application
CVE-2025-34222Same product: Vasion Virtual Appliance Application
CVE-2025-34231Same product: Vasion Virtual Appliance Application
CVE-2025-34198Same product: Vasion Virtual Appliance Application

References