Skip to main content

CVE-2025-23171: Vulnerability in Versa Director

High
VulnerabilityCVE-2025-23171cvecve-2025-23171
Published: Wed Jun 18 2025 (06/18/2025, 23:30:53 UTC)
Source: CVE Database V5
Vendor/Project: Versa
Product: Director

Description

The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. Exploitation Status: Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. Workarounds or Mitigation: There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.

AI-Powered Analysis

AILast updated: 06/19/2025, 00:02:48 UTC

Technical Analysis

CVE-2025-23171 is a high-severity vulnerability affecting the Versa Director SD-WAN orchestration platform, specifically versions 21.2.2 through 22.1.4. The core issue lies in the platform's improper handling of file upload permissions. Although the user interface (UI) appears to restrict file uploads, the backend still accepts them, allowing an authenticated attacker to upload arbitrary files, including malicious webshells. Additionally, the platform discloses the full filename of uploaded temporary files, including UUID prefixes, which can aid attackers in crafting targeted exploits. This vulnerability enables an attacker with valid credentials to upload a webshell, potentially leading to full compromise of the orchestration platform. The CVSS v3.1 base score is 7.2, reflecting high severity, with metrics indicating network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. While no known exploitation in the wild has been reported, proof-of-concept code has been publicly disclosed by third-party researchers. The vulnerability poses a significant risk as it can lead to unauthorized remote code execution, data exfiltration, or disruption of SD-WAN orchestration services. Versa Networks recommends upgrading to remediated software versions as there are no effective workarounds to disable the vulnerable GUI upload functionality.

Potential Impact

For European organizations, the exploitation of CVE-2025-23171 could have severe consequences. The Versa Director platform is critical for managing and orchestrating SD-WAN infrastructure, which many enterprises and service providers rely on for secure and efficient network connectivity. Successful exploitation could allow attackers to deploy webshells, leading to unauthorized access, lateral movement within networks, and potential disruption of network services. This could compromise sensitive data confidentiality, integrity of network configurations, and availability of network services, impacting business operations and potentially causing regulatory compliance issues under GDPR. Given the high privileges required but no user interaction needed, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The lack of reported active exploitation does not diminish the risk, as the availability of proof-of-concept code lowers the barrier for attackers. Organizations in sectors such as finance, telecommunications, critical infrastructure, and government are particularly at risk due to their reliance on SD-WAN technologies and the strategic importance of their network infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Versa Director to the latest remediated versions as recommended by Versa Networks. Since no workarounds exist to disable the vulnerable file upload GUI functionality, patching is the primary defense. Organizations should also enforce strict access controls and monitor for unusual file upload activities within the Versa Director platform. Implementing multi-factor authentication (MFA) for all users with access to the orchestration platform can reduce the risk of credential compromise. Network segmentation should be employed to limit the exposure of the Versa Director system to only trusted management networks. Additionally, continuous monitoring and logging of file upload events and webshell indicators can help detect exploitation attempts early. Incident response plans should be updated to include scenarios involving SD-WAN orchestration compromise. Finally, organizations should review and tighten permissions for users with high privileges on the platform to minimize the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-01-12T01:00:00.649Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68534fe133c7acc04607dd66

Added to database: 6/18/2025, 11:46:41 PM

Last enriched: 6/19/2025, 12:02:48 AM

Last updated: 7/30/2025, 4:18:58 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats