CVE-2025-24288

| EUVD-2025-18666 CRITICAL
2025-06-19 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 00:08 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:08 euvd
EUVD-2025-18666
CVE Published
Jun 19, 2025 - 00:15 nvd
CRITICAL 9.8

Description

The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services. Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. Workarounds or Mitigation: Versa recommends the following security controls: 1) Change default passwords to complex passwords 2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character 3) Passwords must be changed at least every 90 days 4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password. 5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps.

Analysis

Critical authentication bypass vulnerability in Versa Director that exposes multiple services (SSH, PostgreSQL, and others) with default credentials on internet-facing deployments. The vulnerability affects Versa Director installations where default passwords remain unchanged, allowing unauthenticated remote attackers to gain complete system compromise (confidentiality, integrity, and availability impact). While no confirmed exploitation has been reported, proof-of-concept code has been publicly disclosed by security researchers, and the CVSS 9.8 score reflects the severity of unrestricted remote access with default credentials.

Technical Context

The vulnerability stems from CWE-1188 (Initialization with Hard-Coded Network Resource Configuration Data), representing a fundamental design flaw where Versa Director ships with default credentials across multiple user accounts that possess sudo/administrative privileges. The affected services include SSH (port 22) and PostgreSQL (port 5432), both enabled by default and accessible without network segmentation. The root cause is inadequate secure-by-default configuration: rather than forcing credential rotation on first login or requiring complex passwords during initial setup, Versa Director allows these high-privileged accounts to remain accessible with static, publicly-known credentials. This affects Versa Director appliances deployed in cloud or network edge environments where internet exposure is common. The multi-account nature (multiple default accounts with identical credentials and elevated privileges) compounds the attack surface.

Affected Products

Versa Director (version information not explicitly specified in advisory; assume all current versions unless patched). CPE data would typically follow: cpe:a:versa_networks:director:* (all versions). The vulnerability affects standard Versa Director appliance deployments where default credentials are not changed during initial provisioning. Primary affected accounts include those with sudo access that share default credentials across the platform.

Remediation

Immediate actions required: (1) Change all default account passwords to complex passwords meeting requirements: minimum 8 characters, mixed case (upper/lower), at least one digit, at least one special character. Apply this to all accounts with sudo access. (2) Restrict network access to SSH (port 22) and PostgreSQL (port 5432) using firewall rules—remove direct internet exposure and require VPN/bastion host access. (3) Implement password policy enforcement: mandatory password changes every 90 days, password history tracking (last 5 passwords cannot be reused), complexity enforcement. (4) Enable and audit authentication logs for all login attempts, flagging failed attempts or logins from unexpected locations. (5) Monitor vendor security advisories from Versa Networks for patched versions when released. Until patches are available, strict network segmentation and credential rotation are mandatory mitigations. Note: The Versa Networks advisory does not specify patched versions, indicating this may be a recently disclosed vulnerability without available patches at publication time.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Share

CVE-2025-24288 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy