CVE-2024-39717
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.
Analysis
Versa Director GUI contains a file upload vulnerability in the 'Change Favicon' functionality that allows provider-level administrators to upload malicious files, exploited by Volt Typhoon (Chinese APT) against ISPs.
Technical Context
The CWE-434 unrestricted file upload in the 'Change Favicon' feature accepts executable files alongside legitimate image files. While requiring Provider-Data-Center-Admin privileges, these credentials were obtained through prior compromise of upstream systems.
Affected Products
['Versa Director GUI']
Remediation
Apply Versa security updates. Audit provider admin accounts for unauthorized access. Check for VersaMem web shell indicators. Restrict management access to Versa Director.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today