{"id":8756,"date":"2024-08-29T22:52:11","date_gmt":"2024-08-29T13:52:11","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8756"},"modified":"2025-01-21T22:55:14","modified_gmt":"2025-01-21T13:55:14","slug":"chinas-volt-typhoon-hackers-caught-exploiting-zero-day-in-servers-used-by-isps-msps","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/chinas-volt-typhoon-hackers-caught-exploiting-zero-day-in-servers-used-by-isps-msps\/","title":{"rendered":"China\u2019s Volt Typhoon Hackers Caught Exploiting Zero-Day in Servers Used by ISPs, MSPs"},"content":{"rendered":"\n<p>Security researchers at Lumen Technologies have identified Chinese APT group Volt Typhoon leveraging a newly discovered zero-day vulnerability in Versa Director servers to compromise credentials and infiltrate downstream customer networks.<br>The critical vulnerability, CVE-2024-39717, was recently added to the Cybersecurity and Infrastructure Security Agency&#8217;s (CISA) list of mandatory patches. Versa Networks confirmed the active exploitation of the zero-day and issued a warning that attackers could exploit the Versa Director graphical user interface (GUI) to deploy malware on vulnerable systems.<br>Versa Director servers are pivotal for managing network configurations in environments using SD-WAN software and are widely utilized by ISPs and MSPs. This makes them an attractive target for adversaries aiming to infiltrate enterprise network management systems.<br>Versa Networks acknowledged a confirmed case of exploitation, citing a customer&#8217;s failure to implement firewall guidelines issued in 2015 and 2017. This oversight enabled attackers to exploit the vulnerability without requiring access to the GUI. Versa\u2019s statement indirectly attributed the breach to configuration errors by affected organizations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers at Lumen Technologies have identified Chinese APT group Volt Typhoon leveraging a newly discovered zero-day vulnerability in Versa Director servers to compromise credentials and infiltrate downstream customer networks.The critical vulnerability, CVE-2024-39717, was recently added to the Cybersecurity and Infrastructure Security Agency&#8217;s (CISA) list of mandatory patches. Versa Networks confirmed the active exploitation of the zero-day and issued a<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[220,6,10],"tags":[],"class_list":["post-8756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government-advisory","category-latest_news","category-latest_vulnerabilities"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2025\/01\/080321-Zero-Day-Attack-Vulnerability-Detection-and-Prevention-that-Cybersecurity-Companies-Offer-FI-min.png?fit=1200%2C800&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8756"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8756"}],"version-history":[{"count":1,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8756\/revisions"}],"predecessor-version":[{"id":8759,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8756\/revisions\/8759"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8761"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}