目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2025-34197— Vasion Print和Vasion Print Virtual Appliance Host 安全漏洞

EPSS 0.05% · P15
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2025-34197の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Vasion Print (formerly PrinterLogic) Undocumented Local Account with Hardcoded Password and Passwordless sudo
ソース: NVD (National Vulnerability Database)
脆弱性説明
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951, Application prior to 20.0.2368 (VA and SaaS deployments) contain an undocumented local user account named ubuntu with a preset password and a sudoers entry granting that account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). Anyone who knows the hardcoded password can obtain root privileges via local console or equivalent administrative access, enabling local privilege escalation. This vulnerability has been identified by the vendor as: V-2024-010 — Hardcoded Linux Password. NOTE: The patch for this vulnerability is reported to be incomplete: /etc/shadow was remediated but /etc/sudoers remains vulnerable.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
使用硬编码的凭证
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Vasion Print和Vasion Print Virtual Appliance Host 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Vasion Print和Vasion Print Virtual Appliance Host都是Vasion公司的产品。Vasion Print是一款基于 SaaS 的云托管应用程序,用于管理和部署打印机。Vasion Print Virtual Appliance Host是一个打印管理软件。 Vasion Print Virtual Appliance Host 22.0.951之前版本和Vasion Print Application 20.0.2368版本存在安全漏洞,该漏洞源于存在预设密码的
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
VasionPrint Virtual Appliance Host * ~ 22.0.951 -
VasionPrint Application * ~ 20.0.2368 -

II. CVE-2025-34197の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2025-34197のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Vasion · 2025-09-19 · 18 CVEs total

CVE-2025-34198Vasion Print (formerly PrinterLogic) Shared / Hardcoded SSH Host Private Keys in Appliance
CVE-2025-34190Vasion Print (formerly PrinterLogic) PrinterInstallerClientService Authentication Bypass v
CVE-2025-34191Vasion Print (formerly PrinterLogic) Arbitrary File Write as Root via Response Path Symlin
CVE-2025-34188Vasion Print (formerly PrinterLogic) Local Log Disclosure of Cleartext Sessions
CVE-2025-34205Vasion Print (formerly PrinterLogic) Dangerous PHP Dead Code Enables RCE
CVE-2025-34199Vasion Print (formerly PrinterLogic) Insecure SSL Verification Allows Man-in-the-Middle At
CVE-2025-34193Vasion Print (formerly PrinterLogic) Insecure Windows Components Lack Modern Memory Protec
CVE-2025-34201Vasion Print (formerly PrinterLogic) Lack of Network Segmentation Between Docker Instances
CVE-2025-34203Vasion Print (formerly PrinterLogic) Use of Outdated, End-Of-Life, and Vulnerable Third-Pa
CVE-2025-34200Vasion Print (formerly PrinterLogic) Network Account Password Stored in Cleartext
CVE-2025-34195Vasion Print (formerly PrinterLogic) Unquoted Path During Driver Installation Leads to Exe
CVE-2025-34194Vasion Print (formerly PrinterLogic) Local Privilege Escalation via Insecure Temporary Fil
CVE-2025-34204Vasion Print (formerly PrinterLogic) Processes Running as Root Inside Docker Instances
CVE-2025-34206Vasion Print (formerly PrinterLogic) Insecure Shared Storage Permissions
CVE-2025-34192Vasion Print (formerly PrinterLogic) Usage of Outdated and Unsupported OpenSSL Version
CVE-2025-34189Vasion Print (formerly PrinterLogic) Insecure Inter-Process Communication Allows Local Ses
CVE-2025-34202Vasion Print (formerly PrinterLogic) Insecure Access to Docker Instances WAN

IV. 関連脆弱性

V. CVE-2025-34197へのコメント

まだコメントはありません


コメントを残す