WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness - Censys Reports Hundreds of Versa Director Servers May be Exposed to Volt Typhoon Exploitation
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Censys Reports Hundreds of Versa Director Servers May be Exposed to Volt Typhoon Exploitation

Author: Chase Snow

Created: Thursday, August 29, 2024 - 17:55

Categories: Cybersecurity, Security Preparedness

Yesterday, cybersecurity firm Censys shared live search queries showing hundreds of potentially exposed Versa Director servers (CVE-2024-39717) presenting an open attack surface for threat actors. On Tuesday, WaterISAC shared how state-sponsored threat actor Volt Typhoon has been observed exploiting the Versa Director vulnerability in ISP and MSP servers, potentially leaving water and wastewater organizations of various sizes open to attack.    

Versa Director servers are utilized to oversee network configurations for clients operating SD-WAN software, and they are frequently employed by ISPs and MSPs. This makes them an appealing target for threat actors aiming to expand their influence within enterprise network management. Given that these servers are widely used by ISPs and MSPs, the extent of the exposure is considered enormous.

Versa Networks has released patches (available only on password-protected support portal) for versions 21.2.3, 22.1.2, and 22.1.3.

For more information, visit SecurityWeek. For details of the observed Versa Director intrusions and IOCs, visit Black Lotus Labs.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar