The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory concerning a vulnerability in Versa Networks’ Versa Director software, identified as CVE-2024-45229. This flaw stems from improper input validation in certain REST APIs within the platform. If left unpatched, attackers could exploit the issue by injecting invalid arguments into GET requests, potentially exposing authentication tokens of logged-in users. The vulnerability poses significant security risks, especially for organizations with Versa Director instances directly connected to the Internet.
Versa Director is a centralized management tool for Secure SD-WAN and SASE solutions, playing a vital role in orchestrating and managing network and security policies. Its REST APIs streamline network operations by enabling automation and centralized configuration. However, the discovered flaw compromises the effectiveness of these functions by allowing unauthorized access through vulnerable APIs that require no authentication. This exposes sensitive tokens, creating the potential for broader security breaches.
Multiple versions of Versa Director are affected, particularly releases before September 9, 2024. Versions such as 22.1.4, 22.1.3, 22.1.2, 22.1.1, 21.2.3, and 21.2.2 have been confirmed as vulnerable. The flaw has been assigned a CVSS score of 6.6, indicating a high-severity threat level. Exploitation could lead to unauthorized access to sensitive network functions without revealing usernames or passwords, making timely patch application essential to maintaining network security.
To mitigate risks, organizations are urged to implement the latest patches and upgrade vulnerable versions immediately. Additional security measures include using Web Application Firewalls (WAF), isolating critical systems through network segmentation, and deploying Security Information and Event Management (SIEM) tools. Regular monitoring of system logs and alerts is also recommended to detect suspicious activities and address potential threats promptly. Taking these steps can help organizations strengthen their network defenses against this critical vulnerability.
Reference: