China’s Volt Typhoon Exploits Versa Bug: A Cybersecurity Nightmare Unfolds
China’s Volt Typhoon has exploited a high-severity bug in Versa Director, planting credential-stealing web shells in networks. The vulnerability, CVE-2024-39717, impacts unpatched systems, allowing attackers to access service providers’ downstream customers. Versa urges immediate patching to thwart ongoing cyber espionage.

Hot Take:
Looks like Volt Typhoon has graduated from the School of Cyber Mischief with honors, moving from the regular old digital pickpocketing to full-on network heists. Versa customers, it’s time to patch up those digital potholes before more credential-harvesting gremlins crawl in.
Key Points:
- A high-severity bug in Versa Director is being exploited by China’s Volt Typhoon to infiltrate networks.
- The vulnerability, CVE-2024-39717, allows the planting of credential-harvesting web shells.
- Volt Typhoon has been using this exploit as a zero-day for over two months.
- Versa has released a patch and recommends updating to version 22.1.4 or later.
- CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog.
Membership Required
You must be a member to access this content.