The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The Spack upload endpoint can be leveraged for a Time-of-Check to Time-of-Use (TOCTOU) write in combination with a race condition to achieve remote code execution via path loading manipulation, allowing an unauthenticated actor to achieve remote code execution (RCE).This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
History

Thu, 22 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 May 2025 22:15:00 +0000

Type Values Removed Values Added
Description The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The Spack upload endpoint can be leveraged for a Time-of-Check to Time-of-Use (TOCTOU) write in combination with a race condition to achieve remote code execution via path loading manipulation, allowing an unauthenticated actor to achieve remote code execution (RCE).This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.
Title Versa Concerto Authentication Bypass File Write Remote Code Execution
Weaknesses CWE-287
CWE-362
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-05-21T21:58:31.698Z

Updated: 2025-05-28T03:56:04.254Z

Reserved: 2025-04-15T19:15:22.545Z

Link: CVE-2025-34027

cve-icon Vulnrichment

Updated: 2025-05-22T15:09:08.732Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-21T22:15:50.680

Modified: 2025-05-23T15:55:02.040

Link: CVE-2025-34027

cve-icon Redhat

No data.