Authentication Bypass Vulnerability in Versa Concerto SD-WAN Orchestration Platform
CVE-2025-34026

9.2CRITICAL

Key Information:

Vendor

Versa

Status
Vendor
CVE Published:
21 May 2025

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 45%πŸ¦… CISA Reported

What is CVE-2025-34026?

The Versa Concerto SD-WAN orchestration platform contains a vulnerability that allows an attacker to bypass authentication due to a misconfiguration in the Traefik reverse proxy. This flaw potentially grants access to sensitive administrative endpoints, enabling unauthorized access to sensitive internal data, such as heap dumps and trace logs. Affected versions include Concerto from 12.1.2 to 12.2.0, with other versions possibly impacted as well. Organizations using this platform must take immediate steps to mitigate this vulnerability.

CISA has reported CVE-2025-34026

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-34026 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Concerto 12.1.2 <= 12.2.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

45% chance of being exploited in the next 30 days.

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • πŸ¦…

    CISA Reported

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ProjectDiscovery
Harsh Jaiswal
Rahul Maini
Parth Malhotra
.