VYPR
Unrated severityNVD Advisory· Published Oct 2, 2025· Updated Nov 17, 2025

Vasion Print (formerly PrinterLogic) Readable Cleartext Passwords

CVE-2025-34210

Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."

Affected products

3
  • Vasion/Print Applicationv5
    Range: *
  • Vasion/Print Virtual Appliance Hostv5
    Range: *

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.