CVE-2024-39717

ENISA EUVD: EUVD-2024-38202 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 3 articles Published: 2024-08-22

EPSS Score

Source: FIRST.org · 2026-05-23
5.36%
probability
This CVE has a 5.36% probability of being exploited in the next 30 days.
0% Top 90.2th percentile of all CVEs 100%

CVSS v3.0

Source: VulnerabilityLookup (CIRCL)
6.6
MEDIUM
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in.

Affected Products

Versa
Director
21.2.2 21.2.3 before 2024-06-21 22.1.1 22.1.2 before 2024-06-21 22.1.3 before 2024-06-21

Attack Intelligence

Signal Intelligence

Confidence
92%
EPSS 5.36%
CVSS v3.0 6.6
Mentions 3
Last Seen Aug 27, 2024

CNA Information

CNA Assigner
hackerone

Analyst Note

CVE-2024-39717 is explicitly named as a zero-day exploited in the wild by Chinese Volt Typhoon threat actors against ISPs and MSPs. Published August 22, 2024, with confirmed active exploitation documented by reputable sources (BleepingComputer). Versa released a patch in response to active attacks, meeting the zero-day criteria of exploitation preceding or concurrent with patch availability.

Threat Actors 11

Harvester
apt_group Information theft and espionage Unknown
Hacking Team
apt_group 🇮🇹 IT
Volt Typhoon
apt_group Information theft and espionage 🇨🇳 CN
Group 27
apt_group Information theft and espionage 🇨🇳 CN
Inception
apt_group Information theft and espionage 🇷🇺 RU
The White Company
apt_group Information theft and espionage 🇨🇳 CN
Test Panda
apt_group 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
Big Panda
apt_group 🇨🇳 CN
Beijing Group
apt_group Information theft and espionage 🇨🇳 CN
Electric Panda
apt_group 🇨🇳 CN

Triage Info

Decided atMar 05, 2026
Published DateAug 22, 2024