Metrics
Affected Vendors & Products
Tue, 23 Sep 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 CWE-362 |
Tue, 23 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 22 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 May 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The Spack upload endpoint can be leveraged for a Time-of-Check to Time-of-Use (TOCTOU) write in combination with a race condition to achieve remote code execution via path loading manipulation, allowing an unauthenticated actor to achieve remote code execution (RCE).This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable. | |
| Title | Versa Concerto Authentication Bypass File Write Remote Code Execution | |
| Weaknesses | CWE-287 CWE-362 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-05-21T21:58:31.698Z
Updated: 2025-09-23T15:44:45.971Z
Reserved: 2025-04-15T19:15:22.545Z
Link: CVE-2025-34027
Updated: 2025-05-22T15:09:08.732Z
Status : Awaiting Analysis
Published: 2025-05-21T22:15:50.680
Modified: 2025-09-23T16:15:32.103
Link: CVE-2025-34027
No data.