Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-34197

Опубликовано: 19 сент. 2025
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951, Application prior to 20.0.2368 (VA and SaaS deployments) contain an undocumented local user account named ubuntu with a preset password and a sudoers entry granting that account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). Anyone who knows the hardcoded password can obtain root privileges via local console or equivalent administrative access, enabling local privilege escalation. This vulnerability has been identified by the vendor as: V-2024-010 — Hardcoded Linux Password. NOTE: The patch for this vulnerability is reported to be incomplete: /etc/shadow was remediated but /etc/sudoers remains vulnerable.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
Версия до 20.0.2368 (исключая)
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
Версия до 22.0.951 (исключая)

EPSS

Процентиль: 5%
0.00022
Низкий

7.8 High

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 7.8
github
5 месяцев назад

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951, Application prior to 20.0.2368 (VA and SaaS deployments) contain an undocumented local user account named ubuntu with a preset password and a sudoers entry granting that account passwordless root privileges (ubuntu ALL=(ALL) NOPASSWD: ALL). Anyone who knows the hardcoded password can obtain root privileges via local console or equivalent administrative access, enabling local privilege escalation. NOTE: The patch for this vulnerability is reported to be incomplete: /etc/shadow was remediated but /etc/sudoers remains vulnerable.

EPSS

Процентиль: 5%
0.00022
Низкий

7.8 High

CVSS3

Дефекты

CWE-798