Versa Director Flaws Let Attackers Execute Arbitrary Commands

Versa Director Flaws Let Attackers Execute Arbitrary Commands

A newly disclosed set of vulnerabilities in Versa Networks’ SD-WAN orchestration platform, Versa Director, with the flaws enabling authenticated attackers to upload malicious files and execute arbitrary commands on affected systems.

The vulnerabilities, tracked as CVE-2025-23171 and CVE-2025-23172, stem from insecure file upload and webhook functionalities, both carrying a CVSS score of 7.2, indicating high severity.

Vulnerability Details

The first flaw, CVE-2025-23171, allows authenticated users to upload files—including dangerous types such as webshells—through the platform’s UCPE image upload feature.

– Advertisement –

While the user interface appears to block such uploads, backend checks are insufficient, and uploads can still succeed.

 Critically, Versa Director discloses the full filename, including a UUID prefix, of uploaded temporary files, providing attackers with the precise path needed to trigger malicious payloads.

This can lead to remote code execution (RCE) if a webshell is uploaded and accessed.

Vulnerabilities CVE-2025-23171 (File Upload), CVE-2025-23172 (Webhook Abuse)
Severity High (CVSS 7.2)
Affected Versions 22.1.4 (pre-Feb 8, 2025), 22.1.3/22.1.2/21.2.3 (pre-June 10, 2025), 22.1.1, 21.2.2

The second vulnerability, CVE-2025-23172, involves the misuse of the platform’s webhook feature. Intended for sending alerts to external endpoints, the Add Webhook and Test Webhook functions can be manipulated to send crafted HTTP requests to the local system.

This opens the door for authenticated users to execute commands as the “versa” user, who holds sudo privileges—effectively granting attackers full control over the device.

Affected Versions and Remediation

The vulnerabilities impact a wide range of Versa Director versions. The table below summarizes the affected and remediated versions:

Version Affected Unaffected (Patched)
22.1.4 Images released before Feb 8, 2025 Feb 8, 2025 Hot Fix and later
22.1.3 All June 10, 2025 and later
22.1.2 All June 10, 2025 and later
22.1.1 All None
21.2.3 All June 10, 2025 and later
21.2.2 All None

Versa Networks has not observed real-world exploitation of these specific flaws, but proof-of-concept code is publicly available, increasing the risk of opportunistic attacks. 

There are no effective workarounds for disabling the vulnerable GUI options; upgrading to a remediated version is the only recommended mitigation.

The vulnerabilities are classified as high severity and are associated with several Common Weakness Enumerations (CWEs):

  • CWE-266: Incorrect Privilege Assignment
  • CWE-377: Insecure Temporary File
  • CWE-434: Unrestricted Upload of File with Dangerous Type

While Versa Networks is not currently aware of any successful exploitations, the publication of proof-of-concept exploits by security researchers has heightened the urgency for organizations to patch affected systems immediately.

The vulnerabilities have drawn attention from major cybersecurity authorities, with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) urging organizations to apply patches and monitor for signs of compromise. 

Versa Networks has acknowledged the CISA Rapid Action Force for discovering and reporting the flaws.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link