Логотип exploitDog
bind:CVE-2024-42450
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42450

Количество 3

Количество 3

nvd логотип

CVE-2024-42450

около 1 года назад

The Versa Director uses PostgreSQL (Postgres) to store operational and configuration data. It is also needed for High Availability function of the Versa Director. The default configuration has a common password across all instances of Versa Director. By default, Versa Director configures Postgres to listen on all network interfaces. This combination allows an unauthenticated attacker to access and administer the database or read local filesystem contents to escalate privileges on the system. Exploitation Status: Versa Networks is not aware of this exploitation in any production systems. A proof of concept exists in the lab environment. Workarounds or Mitigation: Starting with the latest 22.1.4 version of Versa Director, the software will automatically restrict access to the Postgres and HA ports to only the local and peer Versa Directors. For older releases, Versa recommends performing manual hardening of HA ports. Please refer to the following link for the steps https://docs.versa-

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-hfwx-j6h2-rmf7

около 1 года назад

The Versa Director uses PostgreSQL (Postgres) to store operational and configuration data. It is also needed for High Availability function of the Versa Director. The default configuration has a common password across all instances of Versa Director. By default, Versa Director configures Postgres to listen on all network interfaces. This combination allows an unauthenticated attacker to access and administer the database or read local filesystem contents to escalate privileges on the system. Exploitation Status: Versa Networks is not aware of this exploitation in any production systems. A proof of concept exists in the lab environment. Workarounds or Mitigation: Starting with the latest 22.1.4 version of Versa Director, the software will automatically restrict access to the Postgres and HA ports to only the local and peer Versa Directors. For older releases, Versa recommends performing manual hardening of HA ports. Please refer to the following link for the steps https://docs.ver...

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2024-10251

около 1 года назад

Уязвимость программной платформы управления сетевой инфраструктуры Versa Director, связанная с использованием предустановленных учетных данных при конфигурации с PostgreSQL, позволяющая нарушителю получить доступ к конфиденциальным данным, повысить свои привилегии и потенциально выполнить произвольный код

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42450

The Versa Director uses PostgreSQL (Postgres) to store operational and configuration data. It is also needed for High Availability function of the Versa Director. The default configuration has a common password across all instances of Versa Director. By default, Versa Director configures Postgres to listen on all network interfaces. This combination allows an unauthenticated attacker to access and administer the database or read local filesystem contents to escalate privileges on the system. Exploitation Status: Versa Networks is not aware of this exploitation in any production systems. A proof of concept exists in the lab environment. Workarounds or Mitigation: Starting with the latest 22.1.4 version of Versa Director, the software will automatically restrict access to the Postgres and HA ports to only the local and peer Versa Directors. For older releases, Versa recommends performing manual hardening of HA ports. Please refer to the following link for the steps https://docs.versa-

CVSS3: 10
0%
Низкий
около 1 года назад
github логотип
GHSA-hfwx-j6h2-rmf7

The Versa Director uses PostgreSQL (Postgres) to store operational and configuration data. It is also needed for High Availability function of the Versa Director. The default configuration has a common password across all instances of Versa Director. By default, Versa Director configures Postgres to listen on all network interfaces. This combination allows an unauthenticated attacker to access and administer the database or read local filesystem contents to escalate privileges on the system. Exploitation Status: Versa Networks is not aware of this exploitation in any production systems. A proof of concept exists in the lab environment. Workarounds or Mitigation: Starting with the latest 22.1.4 version of Versa Director, the software will automatically restrict access to the Postgres and HA ports to only the local and peer Versa Directors. For older releases, Versa recommends performing manual hardening of HA ports. Please refer to the following link for the steps https://docs.ver...

CVSS3: 10
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-10251

Уязвимость программной платформы управления сетевой инфраструктуры Versa Director, связанная с использованием предустановленных учетных данных при конфигурации с PostgreSQL, позволяющая нарушителю получить доступ к конфиденциальным данным, повысить свои привилегии и потенциально выполнить произвольный код

CVSS3: 10
0%
Низкий
около 1 года назад

Уязвимостей на страницу