A critical vulnerability has been identified in Versa Director, a vital component of the company’s SD-WAN solution.
The vulnerability, officially designated as CVE-2024-39717, allows attackers to upload potentially malicious files, granting them system administrator access.
This issue explicitly affects users with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges.
An Advanced Persistent Threat (APT) actor has exploited the vulnerability in at least one known instance.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial
Despite being difficult to manipulate, the vulnerability is rated “High.” It poses a significant risk to all Versa SD-WAN customers using Versa Director who have not adhered to the recommended system hardening and firewall guidelines.
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-39717 to its “Known Exploited Vulnerabilities” list, underscoring the seriousness of the threat.
The following versions of Versa Director are affected:
Version | Status |
21.2.3 | Vulnerable |
22.1.2 | Vulnerable |
22.1.3 | Vulnerable |
The root cause of the vulnerability lies in the failure of impacted customers to implement Versa’s established system hardening and firewall guidelines.
These guidelines, published in 2015 and 2017, respectively, are crucial for securing management ports and preventing unauthorized access.
Versa Networks has released a patch to address this vulnerability and is actively working with customers to ensure the patch is applied, and that system hardening guidelines are followed.
Recommended Actions for Versa Customers
Customers needing patching, system hardening, or remediation are encouraged to contact Versa Technical Support for guidance.
Versa Networks remains committed to its customers’ security and urges all users to take immediate action to protect their systems from potential exploitation.
Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial
Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…
Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…
Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…
A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…
A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…
A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…