CVE-2024-42450

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to access PostgreSQL databases in Versa Director installations due to default weak credentials and network exposure. Attackers can read files, escalate privileges, or take full control of affected systems. Organizations running Versa Director with default configurations are affected.

💻 Affected Systems

Products:
  • Versa Director
Versions: All versions before 22.1.4
Operating Systems: Not specified, but likely Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable only with default PostgreSQL configuration that listens on all interfaces and uses common password. Not exploitable if published firewall guidelines are implemented.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to read sensitive data, modify configurations, disrupt operations, and pivot to other systems.

🟠

Likely Case

Database compromise leading to data theft, privilege escalation, and potential lateral movement within the network.

🟢

If Mitigated

No impact if proper firewall rules restrict access to PostgreSQL ports or if systems are patched to version 22.1.4+.

🌐 Internet-Facing: HIGH - Default configuration exposes PostgreSQL on all interfaces with weak credentials, making internet-facing systems highly vulnerable.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this without authentication due to default weak credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept exists in lab environments but not publicly available. Vendor is not aware of production exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.1.4

Vendor Advisory: https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3

Restart Required: Yes

Instructions:

1. Download version 22.1.4 from https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4
2. Apply the update following Versa Director upgrade procedures
3. The patch automatically restricts PostgreSQL and HA port access to local and peer systems

🔧 Temporary Workarounds

Manual Port Hardening

linux

Manually restrict access to PostgreSQL and HA ports to only local and peer Versa Director systems

Firewall Implementation

all

Implement published firewall guidelines to restrict network access to vulnerable ports

🧯 If You Can't Patch

  • Implement strict firewall rules to block all external access to PostgreSQL ports (default 5432) and HA ports
  • Change PostgreSQL credentials from default and implement strong authentication mechanisms

🔍 How to Verify

Check if Vulnerable:

Check if PostgreSQL is listening on all interfaces (netstat -tulpn | grep 5432) and verify default credentials work

Check Version:

Check Versa Director version through admin interface or system logs

Verify Fix Applied:

Verify PostgreSQL only listens on local/peer interfaces after patch and test that default credentials no longer work

📡 Detection & Monitoring

Log Indicators:

  • Failed PostgreSQL authentication attempts from unexpected sources
  • Successful PostgreSQL logins from non-local IPs
  • Unusual database queries or configuration changes

Network Indicators:

  • External connections to PostgreSQL port 5432
  • Traffic to HA ports from unauthorized sources
  • Database export/import traffic

SIEM Query:

source_ip NOT IN (allowed_ips) AND dest_port=5432 OR dest_port IN (ha_ports)

🔗 References

📤 Share & Export