Versa Networks has announced patches for a vulnerability in the virtualization and service creation platform Versa Director, warning that proof-of-concept (PoC) code for it exists.
Tracked as CVE-2024-45229 (CVSS score of 6.6), the vulnerability is related to the REST API in Versa Director that is used for orchestration and management, and could lead to the exposure of authentication tokens.
Some of these APIs, including those used for the login screen, banner display, and device registration, do not require authentication by default.
“However, it was discovered that for Directors directly connected to the Internet, one of these APIs can be exploited by injecting invalid arguments into a GET request, potentially exposing the authentication tokens of other currently logged-in users,” Versa explains in an advisory.
An attacker able to obtain other users’ tokens could then use them to invoke additional APIs on port 9183, the network management company explains.
Also read: Top Vulnerability Management Trends Shaping the Cybersecurity in 2024
Versa notes that the vulnerability cannot be used to expose usernames and passwords and that, if the Versa Director is deployed behind a firewall or API gateway, the security solution “can be used to block access to the URLs of vulnerable API”.
“This vulnerability is not exploitable on Versa Directors not exposed to the internet. We have validated that no Versa-hosted head ends have been affected by this vulnerability,” the company says.
Versa has released hot fixes for Director versions 22.1.4, 22.1.3, 22.1.2, and 21.2.3, and recommends that all users update to the latest releases as soon as possible. Those using Director versions 22.1.1 and 21.2.2 should upgrade to the patched 22.1.3 and 21.2.3 iterations, respectively.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.