Home

Description

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.

PUBLISHED Reserved 2025-04-15 | Published 2025-05-21 | Updated 2026-01-22 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:L/SA:N

CISA Known Exploited Vulnerability

Date added 2026-01-22 | Due date 2026-02-12

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unknown

12.1.2 (semver)
affected

Credits

ProjectDiscovery sponsor

Harsh Jaiswal finder

Rahul Maini finder

Parth Malhotra finder

References

projectdiscovery.io/...sa-concerto-authentication-bypass-rce exploit

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-34026 government-resource

projectdiscovery.io/...sa-concerto-authentication-bypass-rce exploit mitigation

cve.org (CVE-2025-34026)

nvd.nist.gov (CVE-2025-34026)

Download JSON