CVE-2025-34290

N/A Unknown

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Versa SASE Client for Windows where an authenticated local attacker can delete arbitrary directories with SYSTEM privileges. By exploiting a race condition combined with symbolic link manipulation, attackers can delete protected system folders and achieve SYSTEM-level execution via MSI rollback techniques. Only Windows systems running affected Versa SASE Client versions are vulnerable.

💻 Affected Systems

Products:
  • Versa SASE Client for Windows
Versions: 7.8.7 through 7.9.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access; the vulnerability exists in the audit log export functionality's privileged service communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and full control over the Windows system.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, enabling lateral movement within the network and persistence establishment.

🟢

If Mitigated

Limited to local authenticated users only; network segmentation and proper endpoint controls reduce lateral movement risk.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated local access, not remotely exploitable.
🏢 Internal Only: HIGH - Any compromised user account on a vulnerable endpoint can escalate to SYSTEM privileges, enabling full endpoint compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local authenticated access and involves race condition exploitation with symbolic link manipulation. The technique is well-documented in security research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.9.4

Vendor Advisory: https://security-portal.versa-networks.com/emailbulletins/69421e33d03aafc8e5bdaf21

Restart Required: Yes

Instructions:

1. Download latest Versa SASE Client version from official vendor portal. 2. Uninstall current vulnerable version. 3. Install updated version. 4. Restart the system.

🔧 Temporary Workarounds

Disable audit log export functionality

windows

Remove or restrict access to the audit log export feature that triggers the vulnerable service communication.

Consult Versa documentation for specific configuration changes to disable audit log exports

Restrict local user privileges

windows

Implement least privilege principles to limit which users can run the Versa SASE Client.

Use Group Policy to restrict application execution to trusted users only

🧯 If You Can't Patch

  • Implement strict endpoint controls to prevent unauthorized local user access
  • Monitor for suspicious file deletion activities in protected system directories

🔍 How to Verify

Check if Vulnerable:

Check Versa SASE Client version in Windows Programs and Features or via 'versa-client --version' command if available.

Check Version:

wmic product where name="Versa SASE Client" get version

Verify Fix Applied:

Verify installed version is 7.9.5 or higher and test audit log export functionality for proper privilege handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in C:\Config.msi or other protected directories
  • Multiple audit log export attempts from non-admin users
  • SYSTEM privilege file operations initiated by Versa SASE service

Network Indicators:

  • Local service communication patterns between Versa client and privileged service

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Config.msi%' OR ProcessName LIKE '%versa%' AND AccessMask='0x10000'

🔗 References

📤 Share & Export