7.5 CVE-2025-34026
Enriched by CISA CISA Kev Catalog Exploit
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2025-34026
Categories
CWE-288 : Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication. Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource. Router allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters. Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key. OS allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock. Direct request of installation file allows attacker to create administrator accounts. Attackers may gain additional privileges by directly requesting the web management URL. Bypass authentication via direct request to named pipe. User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit
| https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce Exploit Mitigation Third Party Advisory |
| https://security-portal.versa-networks.com/emailbulletins/6830f94328defa37548... Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
disclosure@vulncheck.com Exploit
| https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce Exploit Mitigation Third Party Advisory |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Versa | Concerto |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:versa-networks:concerto:*:*:*:*:*:*:*:* | >= 11.4.0 | < 12.1.2 |
| cpe:2.3:a:versa-networks:concerto:12.1.2:-:*:*:*:*:*:* | ||
| cpe:2.3:a:versa-networks:concerto:12.2.0:*:*:*:*:*:*:* | ||
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce |
| https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 127 | Directory Indexing |
Medium |
| 665 | Exploitation of Thunderbolt Protection Flaws |
Very High |
MITRE
Techniques
| id | description |
|---|---|
| T1083 | File and Directory Discovery |
| T1211 | Exploitation for Defensive Evasion |
| T1542.002 | Pre-OS Boot:Component Firmware |
| T1556 | Modify Authentication Process |
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | |
Mitigations
| id | description |
|---|---|
| M1051 | Update software regularly by employing patch management for internal enterprise endpoints and servers. |
| M1051 | Perform regular firmware updates to mitigate risks of exploitation and/or abuse. |
| M1018 | Ensure that proper policies are implemented to dictate the the secure enrollment and deactivation of authentication mechanisms, such as MFA, for user accounts. |
| © 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. | |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
