CVE-2025-34223

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049and Application prior to version 20.0.2786(VA/SaaS deployments) containa default admin accountand an installationtime endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attackercontrolled ones. The script also contains hardcoded SHA512 and SHA1 hashes of the default password, allowing the attacker to bypass passwordpolicy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup.This vulnerability has been identified by the vendor as: V-2024-022  Insecure Installation Credentials.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
UNKNOWN
---
VulnCheckCNA
---
---