CVE Vulnerabilities

CVE-2025-34210

Plaintext Storage of a Password

Published: Oct 02, 2025 | Modified: Oct 09, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product follows a shared responsibility model, where administrators are expected to configure persistent storage encryption.

Weakness

The product stores a password in plaintext within resources such as memory or files.

Affected Software

Name Vendor Start Version End Version
Virtual_appliance_application Vasion - (including) - (including)
Virtual_appliance_host Vasion - (including) - (including)

Potential Mitigations

References