CVE-2024-39717

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2024-39717

Confirmed

Yes

2024-08-23 00:00 UTC


Timestamps

2024-08-23

2024-08-23


Scope

KEV entry: Versa Director Dangerous File Type Upload Vulnerability | Affected: Versa / Director | Description: The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-09-13 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717


References
  • {'id': 'CVE-2024-39717', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-39717'}

b9f058b9-9b47-459c-afdc-ee1f0903ea7c

405284c2-e461-4670-8979-7fd2c9755a60

2026-02-02 13:24 UTC

2026-02-06 07:53 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
vendor_report cisa-kev successful_exploitation 0.80
View details
{
  "cwes": [
    "CWE-434"
  ],
  "date_added": "2024-08-23",
  "due_date": "2024-09-13",
  "feed": "CISA Known Exploited Vulnerabilities Catalog",
  "knownRansomwareCampaignUse": "Unknown",
  "product": "Director",
  "vendorProject": "Versa",
  "vulnerabilityName": "Versa Director Dangerous File Type Upload Vulnerability"
}
-