CVE-2024-39717
ENISA EUVD: EUVD-2024-38202 ↗
Exploited in the Wild
✓ Confirmed 0-Day
Triaged: March 5, 2026
3 articles
Published: 2024-08-22
EPSS Score
Source: FIRST.org · 2026-05-23
5.36%
probability
This CVE has a 5.36% probability
of being exploited in the next 30 days.
0%
Top 90.2th percentile of all CVEs
100%
CVSS v3.0
Source: VulnerabilityLookup (CIRCL)6.6
MEDIUM
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.
Affected Products
Versa
Director
21.2.2
21.2.3 before 2024-06-21
22.1.1
22.1.2 before 2024-06-21
22.1.3 before 2024-06-21
Attack Intelligence
Signal Intelligence
Confidence
92%
EPSS
5.36%
CVSS v3.0
6.6
Mentions
3
Last Seen
Aug 27, 2024
CNA Information
CNA Assigner
hackerone
Analyst Note
CVE-2024-39717 is explicitly named as a zero-day exploited in the wild by Chinese Volt Typhoon threat actors against ISPs and MSPs. Published August 22, 2024, with confirmed active exploitation documented by reputable sources (BleepingComputer). Versa released a patch in response to active attacks, meeting the zero-day criteria of exploitation preceding or concurrent with patch availability.
Threat Actors 11
Harvester
apt_group
Information theft and espionage
Unknown
Hacking Team
apt_group
🇮🇹 IT
Volt Typhoon
apt_group
Information theft and espionage
🇨🇳 CN
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
Inception
apt_group
Information theft and espionage
🇷🇺 RU
The White Company
apt_group
Information theft and espionage
🇨🇳 CN
Test Panda
apt_group
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
Big Panda
apt_group
🇨🇳 CN
Beijing Group
apt_group
Information theft and espionage
🇨🇳 CN
Electric Panda
apt_group
🇨🇳 CN
Triage Info
Decided atMar 05, 2026
Published DateAug 22, 2024