CVE-2025-24288
BaseFortify
Publication date: 2025-06-19
Last updated on: 2025-06-23
Assigner: HackerOne
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1188 | The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to unauthorized remote access with high privileges, potentially allowing attackers to fully compromise the system, access sensitive data, and disrupt services.
Can you explain this vulnerability to me?
This vulnerability in Versa Director software arises because it exposes multiple services by default, including ssh and postgres, to the internet. It uses default credentials across multiple accounts, many with sudo access, allowing attackers an easy foothold if they exploit these default passwords.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be done by reviewing and auditing logs for all authentication attempts to check for unauthorized or suspicious login attempts. Specific commands depend on the system but generally include checking SSH logs (e.g., 'grep sshd /var/log/auth.log' on Linux) and monitoring PostgreSQL logs for unusual access. Additionally, scanning for exposed services like SSH and PostgreSQL on the network can help identify vulnerable systems.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include changing all default passwords to complex passwords that are at least 8 characters long and include upper case, lower case letters, digits, and special characters; enforcing password changes at least every 90 days; ensuring password change history checks the last 5 passwords; and continuously reviewing and auditing authentication logs to detect and respond to unauthorized access attempts.