CVE-2024-45229

6.6 MEDIUM

📋 TL;DR

This vulnerability in Versa Director allows unauthenticated attackers to steal authentication tokens from currently logged-in users by exploiting an unprotected API endpoint. Only internet-facing Versa Director instances are affected, as the exploit requires direct internet access to the vulnerable API.

💻 Affected Systems

Products:
  • Versa Director
Versions: All versions prior to remediation
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects internet-facing Versa Director instances. Versa-hosted head ends are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the Versa Director using stolen authentication tokens, potentially compromising the entire network orchestration and management system.

🟠

Likely Case

Attackers steal authentication tokens and use them to access sensitive management functions, potentially modifying network configurations or accessing sensitive data.

🟢

If Mitigated

With proper network segmentation and WAF protection, the vulnerability cannot be exploited, maintaining normal system operation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves injecting invalid arguments into GET requests to specific API endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Remediated software versions (specific versions not provided in advisory)

Vendor Advisory: https://security-portal.versa-networks.com/emailbulletins/66e4a8ebda545d61ec2b1ab9

Restart Required: Yes

Instructions:

1. Contact Versa Technical Support for remediation guidance. 2. Upgrade Versa Director to remediated software version. 3. Restart affected services.

🔧 Temporary Workarounds

WAF/API Gateway Protection

all

Block access to vulnerable API endpoints using Web Application Firewall or API Gateway

Block URLs: /vnms/devicereg/device/* (ports 9182 & 9183) and /versa/vnms/devicereg/device/* (port 443)

🧯 If You Can't Patch

  • Ensure Versa Director is not directly exposed to the internet
  • Implement strict network segmentation and firewall rules to restrict access to management interfaces

🔍 How to Verify

Check if Vulnerable:

Check if Versa Director is internet-facing and running vulnerable versions. Test API endpoints for token disclosure.

Check Version:

Check Versa Director software version via management interface or CLI

Verify Fix Applied:

Verify upgrade to remediated version and test that API endpoints no longer disclose authentication tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests to /vnms/devicereg/device/* endpoints
  • Multiple failed authentication attempts followed by successful API calls

Network Indicators:

  • Unusual traffic patterns to ports 9182, 9183, and 443 from external sources
  • API calls to device registration endpoints without proper authentication

SIEM Query:

source_ip=external AND (dest_port=9182 OR dest_port=9183 OR dest_port=443) AND uri_path CONTAINS '/vnms/devicereg/device/'

🔗 References

📤 Share & Export