versa-networks CVE Vulnerabilities & Metrics

Focus on versa-networks vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About versa-networks Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with versa-networks. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total versa-networks CVEs: 10
Earliest CVE date: 26 May 2021, 19:15 UTC
Latest CVE date: 22 Aug 2024, 19:15 UTC

Latest CVE reference: CVE-2024-39717

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical versa-networks CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.8

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS versa-networks CVEs

These are the five CVEs with the highest CVSS scores for versa-networks, sorted by severity first and recency.

All CVEs for versa-networks

CVE-2024-39717 versa-networks vulnerability CVSS: 0 22 Aug 2024, 19:15 UTC

The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.

CVE-2021-39285 versa-networks vulnerability CVSS: 4.3 07 Sep 2021, 13:15 UTC

A XSS vulnerability exists in Versa Director Release: 16.1R2 Build: S8. An attacker can use the administration web interface URL to create a XSS based attack.

CVE-2019-25030 versa-networks vulnerability CVSS: 2.1 26 May 2021, 19:15 UTC

In Versa Director, Versa Analytics and VOS, Passwords are not hashed using an adaptive cryptographic hash function or key derivation function prior to storage. Popular hashing algorithms based on the Merkle-Damgardconstruction (such as MD5 and SHA-1) alone are insufficient in thwarting password cracking. Attackers can generate and use precomputed hashes for all possible password character combinations (commonly referred to as "rainbow tables") relatively quickly. The use of adaptive hashing algorithms such asscryptorbcryptor Key-Derivation Functions (i.e.PBKDF2) to hash passwords make generation of such rainbow tables computationally infeasible.

CVE-2019-25029 versa-networks vulnerability CVSS: 10.0 26 May 2021, 19:15 UTC

In Versa Director, the command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.

CVE-2018-16499 versa-networks vulnerability CVSS: 4.3 26 May 2021, 19:15 UTC

In VOS compromised, an attacker at network endpoints can possibly view communications between an unsuspecting user and the service using man-in-the-middle attacks. Usage of unapproved SSH encryption protocols or cipher suites also violates the Data Protection TSR (Technical Security Requirements).

CVE-2018-16498 versa-networks vulnerability CVSS: 2.1 26 May 2021, 19:15 UTC

In Versa Director, the unencrypted backup files stored on the Versa deployment contain credentials stored within configuration files. These credentials are for various application components such as SNMP, and SSL and Trust keystores.

CVE-2018-16497 versa-networks vulnerability CVSS: 7.2 26 May 2021, 19:15 UTC

In Versa Analytics, the cron jobs are used for scheduling tasks by executing commands at specific dates and times on the server. If the job is run as the user root, there is a potential privilege escalation vulnerability. In this case, the job runs a script as root that is writable by users who are members of the versa group.

CVE-2018-16496 versa-networks vulnerability CVSS: 5.0 26 May 2021, 19:15 UTC

In Versa Director, the un-authentication request found.

CVE-2018-16495 versa-networks vulnerability CVSS: 6.5 26 May 2021, 19:15 UTC

In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with.

CVE-2018-16494 versa-networks vulnerability CVSS: 6.5 26 May 2021, 19:15 UTC

In VOS and overly permissive "umask" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers.