The CISA Encourages Federal Departments to Update Versa Director Vulnerability by September

Aug 24, 2024Ravie LakshmananVulnerability / Government Security

The U.S.

CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

Aug 24, 2024Ravie LakshmananVulnerability / Government Security

CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has instructed federal agencies to address a security issue affecting Versa Director, being listed in their Known Exploited Vulnerabilities (KEV) catalog due to live exploitation activities.

The moderate-risk vulnerability, identified as CVE-2024-39717 (CVSS score: 6.6), pertains to a file upload flaw related to the “Change Favicon” function, enabling a malicious actor to upload a harmful file disguised as a PNG image.

CISA mentioned in an advisory that “The Versa Director GUI contains a file upload vulnerability that allows certain administrators to customize the user interface by uploading a .png file, potentially leading to the upload of a malevolent file disguised as an image.”

Cybersecurityincluded four security issues from 2021 and 2022 in their KEV catalog:

  • CVE-2021-33044 (CVSS score: 9.8) – Dahua IP Camera Authentication Bypass Vulnerability
  • CVE-2021-33045 (CVSS score: 9.8) – Dahua IP Camera Authentication Bypass Vulnerability
  • CVE-2021-31196 (CVSS score: 7.2) – Microsoft Exchange Server Information Disclosure Vulnerability
  • CVE-2022-0185 (CVSS score: 8.4) – Linux Kernel Heap-Based Buffer Overflow Vulnerability

It’s pertinent to note that a Chinese-linked cyber threat group known as UNC5174 (also Uteus or Uetus) was tied to the exploitation of CVE-2022-0185 by Mandiant, a subsidiary of Google, earlier this year in March.

Cybersecurity

CVE-2021-31196 was initially revealed as part of a significant set of Microsoft Exchange Server vulnerabilities known as ProxyLogon, ProxyShell, ProxyToken, and ProxyOracle.

“CVE-2021-31196 has been witnessed in active exploitation campaigns where threat actors target unpatched Microsoft Exchange Server instances,” OP Innovate explained. “These attacks usually aim to gain unauthorized access to sensitive data, increase privileges, or introduce further malicious payloads like ransomware or malware.”

Enjoyed this article? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.