Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·8/23/2024

CVE-2024-39717 added to CISA KEV: Versa Director

Status: ✅ Confirmed exploited in the wild

Date added: 2024-08-23

Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Due date: 2024-09-13

Why this matters

The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.