Vasion Print (formerly PrinterLogic) Virtual Appliance...
Critical severity
Unreviewed
Published
Sep 29, 2025
to the GitHub Advisory Database
•
Updated Sep 29, 2025
Description
Published by the National Vulnerability Database
Sep 29, 2025
Published to the GitHub Advisory Database
Sep 29, 2025
Last updated
Sep 29, 2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product's network communications.
References