CVE-2024-45208
Versa Director vulnerability analysis and mitigation

Overview

CVE-2024-45208 affects the Versa Director SD-WAN orchestration platform that uses Cisco NCS application service. The vulnerability exists in the communication between Active and Standby Directors over TCP ports 4566 and 4570 for High Availability (HA) information exchange using a shared password. The affected versions of Versa Director bind these ports to all interfaces, allowing potential unauthorized access (NVD).

Technical details

The vulnerability centers on the exposure of TCP ports 4566 and 4570 used for HA communication between Director nodes. The CVSS v3.1 base score is 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (HackerOne).

Impact

An attacker who can access the Versa Director could exploit the NCS service on port 4566 to perform unauthorized administrative actions and achieve remote code execution. The vulnerability affects both Active and Standby Directors in the HA setup (NVD).

Mitigation and workarounds

Customers are recommended to follow the hardening guide which includes securing HA ports by running the secure-utils.sh script on both primary and secondary Director nodes. The script modifies iptables rules to deny access to ports 4566, 4570, and 5432 except for peer node IP addresses in the HA setup (Versa Docs).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management