Critical Security Flaws in Versa Concerto Platform
Recent investigations by cybersecurity experts have revealed significant security vulnerabilities in the Versa Concerto network security and SD-WAN orchestration platform. These flaws could allow skilled attackers to gain control over affected systems.
Despite the responsible disclosure of these vulnerabilities on February 13, 2025, they remain unaddressed even after the typical 90-day window for patching has passed. This situation has prompted researchers to make the details public, highlighting the urgency for users to be aware of the risks involved.
The Vulnerabilities: Details and Impact
The researchers from ProjectDiscovery, including Harsh Jaiswal, Rahul Maini, and Parth Malhotra, have identified several serious vulnerabilities. They indicated that when exploited in tandem, these flaws can lead to complete compromise of both the application and the host system:
- CVE-2025-34025 (CVSS score: 8.6) – This vulnerability allows privilege escalation and Docker container escape due to the insecure default mounting of host binary paths. Attackers could exploit this to execute code on the underlying host system.
- CVE-2025-34026 (CVSS score: 9.2) – This flaw relates to an authentication bypass in the Traefik reverse proxy configuration. It permits unauthorized access to administrative endpoints, potentially enabling attackers to retrieve heap dumps and trace logs via another vulnerability (CVE-2024-45410).
- CVE-2025-34027 (CVSS score: 10.0) – Another serious authentication bypass vulnerability that allows access to administrative functions. This could be exploited to achieve remote code execution through an endpoint responsible for package uploads, leading to arbitrary file writes.
Exploiting CVE-2025-34027 could enable an attacker to utilize a race condition, allowing the insertion of malicious files onto the disk, which paves the way for remote code execution.
How Attackers Could Carry Out Exploits
The researchers shared an alarming method for exploiting this vulnerability. They described a process where they could overwrite critical system files to execute arbitrary commands remotely:
“By overwriting ../../../../../../etc/ld.so.preload with a new path pointing to /tmp/hook.so and simultaneously uploading the same file containing a malicious payload, we could ensure both operations completed within a single request,” the researchers detailed. This technique could allow the execution of any command on the system while both files were active, effectively providing a reverse shell to the attacker.
Advisory for Users
In light of the uncovered vulnerabilities, users are strongly encouraged to take immediate action. Recommendations include:
- Blocking the use of semicolons in URL paths.
- Dropping any requests where the Connection header includes the value X-Real-Ip.
- Monitoring network traffic and system logs carefully for any irregular activities.
Official Response from Versa Networks
Versa Networks has issued a statement regarding these vulnerabilities. On April 16, 2025, they released Concerto version 12.2.1 GA, which addresses these issues comprehensively. The company emphasized their commitment to upholding high security standards and transparency on their platforms.
“On February 13, 2025, we confirmed the presence of three vulnerabilities within our Concerto software,” the statement read. “We developed and validated fixes by March 7, 2025, and these were packaged in a hotfix made available to our customers. The complete GA software with these fixes became accessible on April 16, 2025.”
While many customers have successfully upgraded to the latest version, Versa acknowledged that some installations may still be in progress. They have provided detailed guidance to affected users on how to mitigate the risks associated with these vulnerabilities.
The company reassured users that there have been no reports of these vulnerabilities being exploited in live environments and confirmed that all affected customers had been notified through proper security channels with instructions on applying the updates.
Versa Networks reiterated their commitment to responsible disclosure practices and expressed ongoing efforts to monitor security threats, ensuring that their platform remains a safe environment for all users.