Wednesday, May 14, 2025
HomeCVE/vulnerabilityVersa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Published on

SIEM as a Service

Follow Us on Google News

Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a single, cloud-based platform.

Enterprises and service providers can redesign their networks to achieve new levels of business success with the help of their SD-WAN and SD-LAN product portfolios.

The Security Research Team of Versa recently unveiled a zero-day vulnerability in its virtualization and service creation platform, Versa Director.

- Advertisement - Google News

The vulnerability has been tracked as “CVE-2024-39717. ” It’s a privilege escalation flaw with a severity level of “High.”

Technical Analysis

In an unusual move, an Advanced Persistent threat actor has been spotted actively exploiting a high-severity vulnerability (CVE-2024-39717) in Versa Director, a Versa Networks SD-WAN Solution component.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

All Versa SD-WAN customers who access Versa Director without the benefit of implemented system hardening and firewall guidelines are under severe threat from this vulnerability, as threat actors can compromise their network and its resources by evading entry controls using bypass authentication.

This particular vulnerability is still considered “High” in the Common Vulnerability Scoring System (CVSS) because it is relatively likely to result in remote code execution and lateral movement within the affected networks.

Consequently, the CISA has covered this vulnerability in its list of practicing denial-of-service attacks.

The targeting focuses on less hardened and consequently more vulnerable Versa SD-WAN systems, compromising Features such as Network Segmentation, Traffic Routing, and Security Policies, among others.

Affected organizations are warned to use the available security patches, perform additional hardening as recommended by Versa, and consider using other network segmentation and monitoring systems to prevent and detect exploitation attempts.

Besides, the patched version is 22.1.4, and here below, we have mentioned the affected systems and versions:-

Versa Director:   

  • 21.2.3 
  • 22.1.2 
  • 22.1.3 

Recommendations

Here below we have mentioned all the recommendations:-

  • Apply hardening best practices.
  • Upgrade the Director to one of the remediated versions.
  • Check to see if the vulnerability has already been exploited. 

Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...