CVE-2024-39717
Known Exploited Vulnerability Entry External Catalog
Entry Details
Confirmed
Yes
2024-08-23 00:00 UTC
Timestamps
2024-08-23
2024-08-23
Scope
KEV entry: Versa Director Dangerous File Type Upload Vulnerability | Affected: Versa / Director | Description: The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin privileges to customize the user interface. The “Change Favicon” (Favorite Icon) enables the upload of a .png file, which can be exploited to upload a malicious file with a .png extension disguised as an image. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-09-13 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717
References
- {'id': 'CVE-2024-39717', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-39717'}
b9f058b9-9b47-459c-afdc-ee1f0903ea7c
405284c2-e461-4670-8979-7fd2c9755a60
2026-02-02 13:24 UTC
2026-02-06 07:53 UTC
Evidence (1)
| Type | Source | Signal | Confidence | Details | GCVE Metadata |
|---|---|---|---|---|---|
| vendor_report | cisa-kev | successful_exploitation | 0.80 |
View details
|
- |