Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39717: Vulnerability in Versa Director

0
Medium
VulnerabilityCVE-2024-39717cvecve-2024-39717
Published: Thu Aug 22 2024 (08/22/2024, 18:47:12 UTC)
Source: CVE Database V5
Vendor/Project: Versa
Product: Director

Description

The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:41:33 UTC

Technical Analysis

CVE-2024-39717 is a vulnerability in the Versa Director management GUI that allows privileged users (Provider-Data-Center-Admin or Provider-Data-Center-System-Admin) to upload files via the 'Change Favicon' feature. Although the upload interface ostensibly accepts only .png files, the vulnerability permits uploading malicious files with a .png extension that can masquerade as legitimate image files. This improper file validation corresponds to CWE-434 (Unrestricted Upload of File with Dangerous Type). The attack surface is limited to authenticated users with high-level administrative privileges, which reduces the likelihood of exploitation but increases the potential impact if exploited. Successful exploitation could allow an attacker to execute arbitrary code or compromise the system’s confidentiality, integrity, and availability. The vulnerability affects multiple versions of Versa Director prior to patches released after June 21, 2024. The CVSS v3.0 score is 6.6, reflecting medium severity with network attack vector, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the vulnerability should be addressed promptly given the critical role of Versa Director in managing network infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network management infrastructure. Versa Director is used to orchestrate and manage SD-WAN and data center networking, so compromise could lead to unauthorized control over network configurations, potential data exfiltration, or disruption of network services. The requirement for high-level admin credentials limits exposure but insider threats or credential compromise could enable exploitation. Impact includes potential loss of confidentiality of sensitive network configurations, integrity violations through unauthorized changes, and availability issues if the system is destabilized or taken offline. Organizations relying on Versa Director for critical network operations, especially in sectors like finance, telecommunications, and government, could face operational disruptions and regulatory compliance challenges if exploited.

Mitigation Recommendations

1. Immediately upgrade Versa Director to versions released after 2024-06-21 that contain the patch for CVE-2024-39717. 2. Restrict Provider-Data-Center-Admin and Provider-Data-Center-System-Admin privileges to the minimum necessary personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3. Monitor and audit all administrative activities related to the 'Change Favicon' feature and file uploads within Versa Director for suspicious behavior. 4. Implement network segmentation to isolate management interfaces of Versa Director from general user networks to reduce exposure. 5. Conduct regular vulnerability assessments and penetration testing focused on management interfaces to detect similar weaknesses. 6. Educate administrators about the risks of uploading files and the importance of verifying file types and sources. 7. Maintain an incident response plan specifically addressing potential compromises of network management systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2024-06-28T01:04:08.821Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9b3247d717aace26a58

Added to database: 10/21/2025, 7:06:27 PM

Last enriched: 10/21/2025, 7:41:33 PM

Last updated: 10/30/2025, 7:52:26 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats