Affected Platforms: Versa Director
Impacted Users: Targeted at managed service providers
Impact: Privilege Escalation
Severity Level: High
Versa Director:
Versions | Affected | Unaffected |
22.1.4 | None | All |
22.1.3 | 22.1.3 images released before June 21, 2024 hot fix. | 22.1.3 June 21, 2024 Hot Fix and later. |
22.1.2 | 22.1.2 image released before June 21, 2024 hot fix. | 22.1.2 June 21, 2024 Hot Fix and later. |
22.1.1 | All | None. Please upgrade to 22.1.3 latest version. |
21.2.3 | 21.2.3 images released before June 21, 2024 hot fix. | 21.2.3 June 21, 2024 and later. |
21.2.2 | All | None. Please upgrade to 21.2.3 latest version. |
Customers should ensure that they have followed recommended best practices for security hardening of Versa Director. Customers can access detailed system hardening and firewall rules guidelines here:
Firewall Requirements (since 2015): This document details the necessary ports and protocols that need to be opened on the appropriate interfaces.
This document provides comprehensive steps for implementing the hardening process for all components of the Versa solution.
Versa recommends that the Director software be upgraded as soon as possible to one of the remediated software versions (see Resources below).
To identify if the vulnerability has already been exploited, customers can inspect the /var/versa/vnms/web/custom_logo/ folder for any suspicious files having been uploaded. Running the command: file -b –mime-type <.png file> should report the file type as “image/png”.
If you are a Versa customer who needs assistance with patching, system hardening, or remediation, please contact Versa Technical Support.
Customers can access one of the patched/remediated versions of Versa Director from the following software download links:
For additional information, please refer to the following resources:
Versa has sent out a security bulletin titled Security Bulletin: Advising The Review of Firewall Requirements for Versa Components to customers and partners on Friday, July 26, 2024. (Versa customer access only)
Versa has notified customers and partners about the vulnerability in Security Bulletin: Advising Zero-Day Vulnerability In Versa Director that was sent out on Friday, August 9, 2024. (Versa customer access only)
This CVE information is publicly available from CISA (Cybersecurity and Infrastructure Security Agency – part of the U.S. Department of Homeland Security), which curates a list of CVEs called the Known Exploited Vulnerabilities (KEV) catalog at CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability.
Versa has updated the PSIRT section of the Versa Security Portal with CVE-2024-39717 to ensure that customers have one place to go for information and our most current information and remediation guidance. (Versa customer access only)
(available since 2017): This document provides comprehensive steps for implementing the hardening process for all components of the Versa solution.
Firewall Requirements (available since 2015): This document details the necessary ports and protocols that need to be opened on the appropriate interfaces.
The bottom line: Versa is actively reaching out and working with our customers and partners to ensure their safety by applying patches and hardening their attack surfaces per guidelines.
Subscribe to the Versa Blog
Gartner Research Report