Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-45208

Summary
Assigner-hackerone
Assigner Org ID-36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At-18 Jun, 2025 | 23:30
Updated At-23 Jun, 2025 | 16:04
Rejected At-
Credits

The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide. Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hackerone
Assigner Org ID:36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At:18 Jun, 2025 | 23:30
Updated At:23 Jun, 2025 | 16:04
Rejected At:
▼CVE Numbering Authority (CNA)

The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide. Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.

Affected Products
Vendor
Versa Networks, Inc.Versa
Product
Director
Default Status
unaffected
Versions
Affected
  • From 21.2.2 through 21.2.2 (semver)
  • From 21.2.3 through 21.2.3 (semver)
  • From 22.1.1 through 22.1.1 (semver)
  • From 22.1.2 through 22.1.2 (semver)
  • From 22.1.3 through 22.1.3 (semver)
  • From 22.1.4 through 22.1.4 (semver)
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718
N/A
https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation
N/A
https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4
N/A
https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3
N/A
https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2
N/A
https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3
N/A
https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566
N/A
Hyperlink: https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3
Resource: N/A
Hyperlink: https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284 Improper Access Control
Type: CWE
CWE ID: CWE-284
Description: CWE-284 Improper Access Control
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:support@hackerone.com
Published At:19 Jun, 2025 | 00:15
Updated At:23 Jun, 2025 | 20:16

The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide. Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-284Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-284
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566support@hackerone.com
N/A
https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718support@hackerone.com
N/A
https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3support@hackerone.com
N/A
https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2support@hackerone.com
N/A
https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3support@hackerone.com
N/A
https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4support@hackerone.com
N/A
https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediationsupport@hackerone.com
N/A
Hyperlink: https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4
Source: support@hackerone.com
Resource: N/A
Hyperlink: https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation
Source: support@hackerone.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

313Records found

Details not found