CVE-2025-34212

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.843 and Application prior to version 20.0.1923 (VA/SaaS deployments) possess CI/CD weaknesses: the build pulls an unverified third-party image, downloads the VirtualBox Extension Pack over plain HTTP without signature validation, and grants the jenkins account NOPASSWD for mount/umount. Together these allow supply chain or man-in-the-middle compromise of the build pipeline, injection of malicious firmware, and remote code execution as root on the CI host. This vulnerability has been identified by the vendor as: V-2023-007 — Supply Chain Attack.
CVSS

No CVSS.

Configurations

No configuration.

History

30 Sep 2025, 14:15

Type Values Removed Values Added
References () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-supply-chain-build-system - () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-supply-chain-build-system -

29 Sep 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-29 21:15

Updated : 2025-10-02 19:12


NVD link : CVE-2025-34212

Mitre link : CVE-2025-34212

CVE.ORG link : CVE-2025-34212


JSON object : View

Products Affected

No product.

CWE
CWE-494

Download of Code Without Integrity Check

CWE-732

Incorrect Permission Assignment for Critical Resource