CVE-2024-42346
Vie, 20/09/2024 – 19:15
CVE-2024-42346
CVE-2024-42346
Vie, 20/09/2024 – 19:15
CVE-2024-42346
CVE-2024-45229
Vie, 20/09/2024 – 19:15
CVE-2024-45229
Currently, there are no workarounds in Versa Director. However, if there is Web Application Firewall (WAF) or API Gateway fronting the Versa Director, it can be used to block access to the URLs of vulnerable API. /vnms/devicereg/device/* (on ports 9182 & 9183) and /versa/vnms/devicereg/device/* (on port 443). Versa recommends that Directors be upgraded to one of the remediated software versions. This vulnerability is not exploitable on Versa Directors not exposed to the Internet.We have validated that no Versa-hosted head ends have been affected by this vulnerability. Please contact Versa Technical Support or Versa account team for any further assistance.
CVE-2024-47062
Vie, 20/09/2024 – 19:15
CVE-2024-47062
CVE-2024-47061
Vie, 20/09/2024 – 19:15
CVE-2024-47061
CVE-2024-9040
Vie, 20/09/2024 – 17:15
CVE-2024-9040
CVE-2024-8612
Vie, 20/09/2024 – 18:15
CVE-2024-8612
CVE-2024-9035
Vie, 20/09/2024 – 15:15
CVE-2024-9035
CVE-2024-9034
Vie, 20/09/2024 – 15:15
CVE-2024-9034
CVE-2024-9033
Vie, 20/09/2024 – 15:15
CVE-2024-9033
CVE-2024-9037
Vie, 20/09/2024 – 16:15
CVE-2024-9037