Serious Versa Concerto Vulnerabilities Allow Attackers to Escape Docker and Compromise Hosts

Published:

spot_img

May 22, 2025Ravie LakshmananVulnerability / Software Security

Critical Security Flaws in Versa Concerto Platform

Recent investigations by cybersecurity experts have revealed significant security vulnerabilities in the Versa Concerto network security and SD-WAN orchestration platform. These flaws could allow skilled attackers to gain control over affected systems.

Despite the responsible disclosure of these vulnerabilities on February 13, 2025, they remain unaddressed even after the typical 90-day window for patching has passed. This situation has prompted researchers to make the details public, highlighting the urgency for users to be aware of the risks involved.

The Vulnerabilities: Details and Impact

The researchers from ProjectDiscovery, including Harsh Jaiswal, Rahul Maini, and Parth Malhotra, have identified several serious vulnerabilities. They indicated that when exploited in tandem, these flaws can lead to complete compromise of both the application and the host system:

  • CVE-2025-34025 (CVSS score: 8.6) – This vulnerability allows privilege escalation and Docker container escape due to the insecure default mounting of host binary paths. Attackers could exploit this to execute code on the underlying host system.
  • CVE-2025-34026 (CVSS score: 9.2) – This flaw relates to an authentication bypass in the Traefik reverse proxy configuration. It permits unauthorized access to administrative endpoints, potentially enabling attackers to retrieve heap dumps and trace logs via another vulnerability (CVE-2024-45410).
  • CVE-2025-34027 (CVSS score: 10.0) – Another serious authentication bypass vulnerability that allows access to administrative functions. This could be exploited to achieve remote code execution through an endpoint responsible for package uploads, leading to arbitrary file writes.

Exploiting CVE-2025-34027 could enable an attacker to utilize a race condition, allowing the insertion of malicious files onto the disk, which paves the way for remote code execution.

How Attackers Could Carry Out Exploits

The researchers shared an alarming method for exploiting this vulnerability. They described a process where they could overwrite critical system files to execute arbitrary commands remotely:

“By overwriting ../../../../../../etc/ld.so.preload with a new path pointing to /tmp/hook.so and simultaneously uploading the same file containing a malicious payload, we could ensure both operations completed within a single request,” the researchers detailed. This technique could allow the execution of any command on the system while both files were active, effectively providing a reverse shell to the attacker.

Advisory for Users

In light of the uncovered vulnerabilities, users are strongly encouraged to take immediate action. Recommendations include:

  • Blocking the use of semicolons in URL paths.
  • Dropping any requests where the Connection header includes the value X-Real-Ip.
  • Monitoring network traffic and system logs carefully for any irregular activities.

Official Response from Versa Networks

Versa Networks has issued a statement regarding these vulnerabilities. On April 16, 2025, they released Concerto version 12.2.1 GA, which addresses these issues comprehensively. The company emphasized their commitment to upholding high security standards and transparency on their platforms.

“On February 13, 2025, we confirmed the presence of three vulnerabilities within our Concerto software,” the statement read. “We developed and validated fixes by March 7, 2025, and these were packaged in a hotfix made available to our customers. The complete GA software with these fixes became accessible on April 16, 2025.”

While many customers have successfully upgraded to the latest version, Versa acknowledged that some installations may still be in progress. They have provided detailed guidance to affected users on how to mitigate the risks associated with these vulnerabilities.

The company reassured users that there have been no reports of these vulnerabilities being exploited in live environments and confirmed that all affected customers had been notified through proper security channels with instructions on applying the updates.

Versa Networks reiterated their commitment to responsible disclosure practices and expressed ongoing efforts to monitor security threats, ensuring that their platform remains a safe environment for all users.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
spot_img

Related articles

Recent articles

UAE Defense Firm Secures $2.45 Billion Missile Boat Contract with Kuwait

UAE's EDGE Signs Major Naval Contract with Kuwait UAE defense company EDGE has recently announced a significant milestone in its maritime operations: a contract worth...

Severe 10-Year-Old Roundcube Webmail Bug Lets Authenticated Users Execute Malicious Code

Critical Vulnerability Discovered in Roundcube Webmail Software A Decade-Long Flaw Uncovered Cybersecurity experts have recently brought to light a significant security weakness in the Roundcube webmail...

Forcepoint Names New CFO to Drive Growth Initiatives

A New Era in Cybersecurity Finance: Matt Derdeyn Joins Forcepoint as CFO Strengthening Leadership in Data Security Forcepoint, a global leader in data security solutions, is...

Child Exploitation Ring Selling Videos on Dark Web Shut Down

Tracing a Dark Web Child Exploitation Ring in Pakistan A Disturbing Discovery In a recent press conference held in Islamabad, Minister of State for Interior Talal...