Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Vasion — Vulnerabilities & Security Advisories 43

Browse all 43 CVE security advisories affecting Vasion. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Vasion operates as a provider of virtual desktop infrastructure (VDI) and desktop virtualization solutions, enabling organizations to deploy remote computing environments. Security audits have identified forty-three Common Vulnerabilities and Exposures (CVEs) associated with its software ecosystem, highlighting significant historical security debt. The majority of these flaws involve remote code execution and cross-site scripting, which allow attackers to compromise system integrity or steal user data without authentication. Additionally, several instances of privilege escalation have been documented, permitting unauthorized users to gain administrative control over virtualized endpoints. While specific major public breaches directly attributed to Vasion are not widely reported in mainstream incident databases, the high volume of unpatched vulnerabilities suggests inconsistent security maintenance practices. These technical weaknesses pose substantial risks to enterprises relying on its platform for sensitive data processing, necessitating rigorous network segmentation and immediate patching strategies to mitigate potential exploitation vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2025-34206 Vasion Print (formerly PrinterLogic) Insecure Shared Storage Permissions — Print Virtual Appliance HostCWE-732 8.4 -2025-09-19
CVE-2025-34199 Vasion Print (formerly PrinterLogic) Insecure SSL Verification Allows Man-in-the-Middle Attacks — Print Virtual Appliance HostCWE-295 9.8 -2025-09-19
CVE-2025-34193 Vasion Print (formerly PrinterLogic) Insecure Windows Components Lack Modern Memory Protections and Use Outdated Runtimes — Print Virtual Appliance HostCWE-755 8.4 -2025-09-19
CVE-2025-34201 Vasion Print (formerly PrinterLogic) Lack of Network Segmentation Between Docker Instances — Print Virtual Appliance HostCWE-653 9.6 -2025-09-19
CVE-2025-34188 Vasion Print (formerly PrinterLogic) Local Log Disclosure of Cleartext Sessions — Print Virtual Appliance HostCWE-532 7.8 -2025-09-19
CVE-2025-34194 Vasion Print (formerly PrinterLogic) Local Privilege Escalation via Insecure Temporary File Handling — Print Virtual Appliance HostCWE-59 7.8 -2025-09-19
CVE-2025-34200 Vasion Print (formerly PrinterLogic) Network Account Password Stored in Cleartext — Print Virtual Appliance HostCWE-312 7.8 -2025-09-19
CVE-2025-34204 Vasion Print (formerly PrinterLogic) Processes Running as Root Inside Docker Instances — Print Virtual Appliance HostCWE-269 10.0 -2025-09-19
CVE-2025-34198 Vasion Print (formerly PrinterLogic) Shared / Hardcoded SSH Host Private Keys in Appliance Image — Print Virtual Appliance HostCWE-798 9.8 -2025-09-19
CVE-2025-34197 Vasion Print (formerly PrinterLogic) Undocumented Local Account with Hardcoded Password and Passwordless sudo — Print Virtual Appliance HostCWE-798 8.4 -2025-09-19
CVE-2025-34192 Vasion Print (formerly PrinterLogic) Usage of Outdated and Unsupported OpenSSL Version — Print Virtual Appliance HostCWE-1104 9.1 -2025-09-19
CVE-2025-34195 Vasion Print (formerly PrinterLogic) Unquoted Path During Driver Installation Leads to Execution of C:\Program.exe — Print Virtual Appliance HostCWE-434 8.8 -2025-09-19
CVE-2025-34203 Vasion Print (formerly PrinterLogic) Use of Outdated, End-Of-Life, and Vulnerable Third-Party Components — Print Virtual Appliance HostCWE-1395 10.0 -2025-09-19

This page lists every published CVE security advisory associated with Vasion. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.