We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34027

Versa Concerto Authentication Bypass File Write Remote Code Execution



Description

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The Spack upload endpoint can be leveraged for a Time-of-Check to Time-of-Use (TOCTOU) write in combination with a race condition to achieve remote code execution via path loading manipulation, allowing an unauthenticated actor to achieve remote code execution (RCE).This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable.

Reserved 2025-04-15 | Published 2025-05-21 | Updated 2025-05-28 | Assigner VulnCheck


CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L

Problem types

CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-287 Improper Authentication

Product status

Default status
unknown

12.1.2
affected

Credits

ProjectDiscovery sponsor

Harsh Jaiswal finder

Rahul Maini finder

Parth Malhotra finder

References

projectdiscovery.io/...sa-concerto-authentication-bypass-rce exploit mitigation

cve.org (CVE-2025-34027)

nvd.nist.gov (CVE-2025-34027)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34027

Support options

Helpdesk Chat, Email, Knowledgebase