Versa Director Vulnerability Allows Remote Arbitrary Command Execution

Versa Networks has disclosed two high-severity vulnerabilities (CVE-2025-23171 and CVE-2025-23172) in its Director SD-WAN orchestration platform, enabling authenticated attackers to execute remote code and escalate privileges.

These flaws expose network management systems to significant compromise risks, particularly affecting service providers and enterprises using unpatched Versa Director deployments.

Technical Exploitation Mechanisms

The vulnerabilities stem from critical security oversights in file upload and webhook functions:

  • CVE-2025-23171 (CVSS 7.2): An insecure file upload mechanism allows authenticated attackers to bypass UI restrictions and upload malicious webshells disguised as legitimate files (e.g., UCPE images).
  • The platform leaks temporary filenames with UUID prefixes, enabling precise targeting of uploaded payloads.
  • CVE-2025-23172 (CVSS 7.2): Webhook functionalities can be weaponized to craft HTTP requests to localhost, permitting command execution under versa user privileges (with sudo access).
  • This enables privilege escalation and full system control.
Affected VersionsFixed VersionsRemediation Deadline
22.1.422.1.4 (Feb 8, 2025+)Immediate upgrade
22.1.322.1.3 (Jun 10, 2025+)Patch by June 10, 2025
22.1.222.1.2 (Jun 10, 2025+)Patch by June 10, 2025
22.1.1None – upgrade requiredMigrate to 22.1.3+
21.2.321.2.3 (Jun 10, 2025+)Patch by June 10, 2025
21.2.2None – upgrade requiredMigrate to 21.2.3+

Mitigation and Response

No workarounds exist for these flaws; upgrading to patched versions is mandatory.

Versa Networks confirms no active exploitation has been observed, but proof-of-concept code is publicly available, heightening attack risks.

Organizations must:

  1. Immediately apply updates using Versa’s official channels.
  2. Audit file upload activities for anomalous .png or executable files.
  3. Restrict webhook permissions and monitor localhost-bound traffic.

CISA has added related vulnerabilities (e.g., CVE-2024-39717) to its Known Exploited Vulnerabilities Catalog, underscoring the platform’s critical role in SD-WAN infrastructure.

With 31 internet-exposed instances globally (16 in the U.S.), unpatched systems face imminent targeting.

Versa credits CISA’s Rapid Action Force for discovering these flaws, highlighting the critical role of coordinated vulnerability disclosure.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here