Article Details
Scrape Timestamp (UTC): 2025-05-22 11:13:29.644
Source: https://thehackernews.com/2025/05/unpatched-versa-concerto-flaws-let.html
Original Article Text
Click to Toggle View
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host. Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestration platform that could be exploited to take control of susceptible instances. It's worth noting that the identified shortcomings remain unpatched despite responsible disclosure on February 13, 2025, prompting a public release of the issues following the end of the 90-day deadline. "These vulnerabilities, when chained together, could allow an attacker to fully compromise both the application and the underlying host system," ProjectDiscovery researchers Harsh Jaiswal, Rahul Maini, and Parth Malhotra said in a report shared with The Hacker News. The security defects are listed below - Successful exploitation of CVE-2025-34027 could allow an attacker to leverage a race condition and write malicious files to disk, ultimately resulting in remote code execution using LD_PRELOAD and a reverse shell. "Our approach involved overwriting ../../../../../../etc/ld.so.preload with a path pointing to /tmp/hook.so," the researchers said. "Simultaneously, we uploaded /tmp/hook.so, which contained a compiled C binary for a reverse shell. Since our request triggered two file write operations, we leveraged this to ensure that both files were written within the same request." "Once these files were successfully written, any command execution on the system while both persisted would result in the execution of /tmp/hook.so, thereby giving us a reverse shell." In the absence of an official fix, users are advised to block semicolons in URL paths and drop requests where the Connection header contains the value X-Real-Ip. It's also recommended to monitor network traffic and logs for any suspicious activity. The Hacker News has reached out to Versa Networks for comment, and we will update the story if we hear back.
Daily Brief Summary
Researchers have identified critical vulnerabilities in the Versa Concerto platform, affecting network security and SD-WAN orchestration.
The discovered flaws, if exploited, allow attackers to completely compromise both the application and its underlying host system.
Notable among the defects is CVE-2025-34027, which leverages a race condition to execute remote code via malicious file writing.
Specific exploitation involves overwriting system files to secure a reverse shell, increasing the severity of potential damage.
Despite responsible disclosure by researchers on February 13, 2025, Versa Networks has not yet released patches for these vulnerabilities.
Recommended interim security measures include blocking certain characters in URLs, dropping specific connection requests, and vigilant monitoring of network traffic.
The ongoing situation raises significant concerns about the security readiness and response strategies of network orchestration platforms.