Unrated severityNVD Advisory· Published Sep 19, 2025· Updated Nov 17, 2025
Vasion Print (formerly PrinterLogic) Network Account Password Stored in Cleartext
CVE-2025-34200
Description
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA and SaaS deployments) provision the appliance with the network account credentials in clear-text inside /etc/issue, and the file is world-readable by default. An attacker with local shell access can read /etc/issue to obtain the network account username and password. Using the network account an attacker can change network parameters via the appliance interface, enabling local misconfiguration, network disruption or further escalation depending on deployment.
Affected products
3- Vasion/Print Applicationv5Range: *
- Vasion/Print Virtual Appliance Hostv5Range: *
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.vulncheck.com/advisories/vasion-print-printerlogic-network-account-password-stored-in-cleartextmitrethird-party-advisory
- help.printerlogic.com/saas/Print/Security/Security-Bulletins.htmmitreproduct
- help.printerlogic.com/va/Print/Security/Security-Bulletins.htmmitreproduct
- pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.htmlmitretechnical-description
News mentions
0No linked articles in our index yet.