Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-24286

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/06/2025

CVE-2025-24287

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/06/2025

CVE-2025-24288

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.<br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> Versa recommends the following security controls:<br /> <br /> 1) Change default passwords to complex passwords<br /> 2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character<br /> 3) Passwords must be changed at least every 90 days<br /> 4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.<br /> 5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
19/06/2025

CVE-2025-24291

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/06/2025

CVE-2024-45208

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.<br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
19/06/2025

CVE-2025-23121

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
19/06/2025

CVE-2025-23168

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. <br /> <br /> Exploitation Status: <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/06/2025

CVE-2025-23169

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. <br /> <br /> Exploitation Status: <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/06/2025

CVE-2025-23170

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. <br /> <br /> Exploitation Status: <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
19/06/2025

CVE-2025-23171

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. <br /> <br /> Exploitation Status: <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/06/2025

CVE-2025-23172

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the "Add Webhook" and "Test Webhook" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. <br /> <br /> Exploitation Status: <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/06/2025

CVE-2025-23173

Fecha de publicación:
19/06/2025
Idioma:
Inglés
*** Pendiente de traducción *** The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. <br /> <br /> Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. <br /> <br /> Workarounds or Mitigation: <br /> <br /> Restrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/06/2025