CVE-2024-45229
Versa Director vulnerability analysis and mitigation

Overview

CVE-2024-45229 is a vulnerability discovered in Versa Networks' Versa Director, a centralized management platform for Secure SD-WAN and SASE solutions. The vulnerability was disclosed on September 20, 2024, affecting Versa Director versions released before September 9, 2024, including versions 22.1.4, 22.1.3, 22.1.2, and earlier versions 22.1.1, 21.2.3, and 21.2.2. The flaw exists in the REST APIs used for orchestration and management, where certain APIs designed to bypass authentication can be exploited (Security Online, CISA).

Technical details

The vulnerability stems from improper input validation in REST APIs that do not require authentication by design, such as login screen, banner display, and device registration interfaces. When Versa Directors are directly connected to the Internet, attackers can exploit this vulnerability by injecting invalid arguments into a GET request. The vulnerability has been assigned a CVSS score of 6.6 (Medium), with the vector string CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H. The vulnerable endpoints include /vnms/devicereg/device/ (on ports 9182 & 9183) and /versa/vnms/devicereg/device/ (on port 443) (NVD, Security Online).

Impact

The exploitation of this vulnerability can lead to the exposure of authentication tokens belonging to currently logged-in users. While the vulnerability does not directly expose usernames or passwords, the compromised tokens can be used to invoke additional APIs on port 9183, potentially leading to unauthorized access and broader security breaches. The impact is particularly significant for Versa Directors that are directly connected to the Internet (Security Online).

Mitigation and workarounds

Versa Networks has released hotfixes for affected versions on September 12, 2024. Users are strongly recommended to upgrade to the patched versions: 22.1.4, 22.1.3, and 22.1.2 with hotfixes, or version 21.2.3 with hotfixes. For users on older versions such as 21.2.2 and 22.1.1, upgrading to version 21.2.3 or 22.1.3 respectively is recommended. As a temporary measure, organizations can employ Web Application Firewalls (WAFs) or API Gateways to block access to the vulnerable API endpoints (Security Online).

Additional resources


SourceThis report was generated using AI

Related Versa Director vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-24288CRITICAL9.8
  • Versa DirectorVersa Director
  • cpe:2.3:a:versa-networks:versa_director
NoYesJun 19, 2025
CVE-2025-23173HIGH7.5
  • Versa DirectorVersa Director
  • cpe:2.3:a:versa-networks:versa_director
NoNoJun 19, 2025
CVE-2025-23172HIGH7.2
  • Versa DirectorVersa Director
  • cpe:2.3:a:versa-networks:versa_director
NoNoJun 19, 2025
CVE-2025-23171HIGH7.2
  • Versa DirectorVersa Director
  • cpe:2.3:a:versa-networks:versa_director
NoNoJun 19, 2025
CVE-2025-24291MEDIUM6.1
  • Versa DirectorVersa Director
  • cpe:2.3:a:versa-networks:versa_director
NoNoJun 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management