Skip to main content

CVE-2025-23170: Vulnerability in Versa Director

Medium
VulnerabilityCVE-2025-23170cvecve-2025-23170
Published: Wed Jun 18 2025 (06/18/2025, 23:30:49 UTC)
Source: CVE Database V5
Vendor/Project: Versa
Product: Director

Description

The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. Exploitation Status: Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. Workarounds or Mitigation: There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.

AI-Powered Analysis

AILast updated: 06/19/2025, 00:04:02 UTC

Technical Analysis

CVE-2025-23170 is a command injection vulnerability identified in the Versa Director SD-WAN orchestration platform, specifically affecting versions 21.2.2 through 22.1.4. Versa Director facilitates centralized management and orchestration of SD-WAN deployments, including the ability to initiate SSH sessions to remote Customer Premises Equipment (CPE) devices and access the Director shell via a web-based interface component called Shell-In-A-Box. The vulnerability resides in a Python script named shell-connect.py, which processes a user-supplied argument without proper sanitization or validation. This flaw allows an authenticated attacker with high privileges to inject arbitrary commands into the system shell, leading to remote code execution on the Director server. The CVSS v3.1 base score is 6.7 (medium severity), reflecting the requirement for local access with high privileges (PR:H), no user interaction (UI:N), and the potential for full confidentiality, integrity, and availability compromise (C:H/I:H/A:H). No public exploitation in the wild has been reported to date, but proof-of-concept code has been disclosed by third-party researchers. Versa Networks recommends upgrading to remediated software versions as there are no available workarounds to disable the vulnerable GUI functionality. This vulnerability poses a significant risk because the Director platform is a critical network management tool; compromise could allow attackers to manipulate SD-WAN configurations, intercept or redirect traffic, or disrupt network operations.

Potential Impact

For European organizations, the exploitation of CVE-2025-23170 could have severe operational and security consequences. Since Versa Director orchestrates SD-WAN deployments, a successful attack could lead to unauthorized control over network routing and policies, potentially enabling data exfiltration, interception of sensitive communications, or denial of service by disrupting network connectivity. This is particularly impactful for sectors reliant on secure and resilient network infrastructure, such as finance, telecommunications, healthcare, and critical infrastructure operators. The compromise of network orchestration tools can also facilitate lateral movement within enterprise environments, increasing the risk of broader breaches. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, organizations may face regulatory scrutiny under GDPR if personal data is exposed or network disruptions affect service availability. The lack of known exploits in the wild reduces immediate risk but does not diminish the urgency for remediation, as proof-of-concept exploits exist and the vulnerability requires only authenticated high-privilege access, which could be obtained through credential compromise or insider threats.

Mitigation Recommendations

To mitigate this vulnerability, European organizations using affected Versa Director versions should prioritize upgrading to the latest patched releases provided by Versa Networks without delay, as no effective workarounds exist to disable the vulnerable GUI functionality. Network segmentation should be enforced to restrict access to the Director management interface strictly to trusted administrators and management networks, minimizing exposure. Implementing strong multi-factor authentication (MFA) and robust credential management policies can reduce the risk of privilege escalation or credential compromise that would enable exploitation. Monitoring and logging of administrative access to the Director platform should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration tests focused on SD-WAN orchestration components. If immediate patching is not feasible, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious command injection patterns targeting the shell-connect.py script, although this is a temporary measure. Finally, maintain up-to-date incident response plans that include scenarios involving network orchestration compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-01-12T01:00:00.649Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68534fe133c7acc04607dd5f

Added to database: 6/18/2025, 11:46:41 PM

Last enriched: 6/19/2025, 12:04:02 AM

Last updated: 7/30/2025, 4:18:57 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats