Remote Code Execution Vulnerability in Aviatrix Controller by Aviatrix
CVE-2024-50603

10CRITICAL

Key Information:

Vendor
Aviatrix
Vendor
CVE Published:
8 January 2025

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 2,990πŸ’° RansomwareπŸ‘Ύ Exploit Exists🟑 Public PoCπŸ“° News Worthy

What is CVE-2024-50603?

CVE-2024-50603 is a remote code execution vulnerability found in the Aviatrix Controller, a management platform for multi-cloud networking solutions. This vulnerability arises from insufficient handling of special elements within operating system commands, enabling unauthenticated attackers to execute arbitrary code on affected systems. If exploited, this can lead to severe consequences for organizations, including unauthorized access to sensitive data and disruption of networking services, which are critical for maintaining operational continuity.

Technical Details

This vulnerability affects versions of the Aviatrix Controller prior to 7.1.4191 and 7.2.x versions before 7.2.4996. The issue stems from the improper neutralization of command-line metacharacters within user inputs sent to specific API endpoints (/v1/api), allowing an attacker to manipulate commands executed in the backend. Due to this oversight in input validation, it opens a vector for executing malicious code remotely, posing substantial risks to the integrity and security of the affected systems.

Potential Impact of CVE-2024-50603

  1. Unauthorized System Access: Exploiting this vulnerability can grant attackers the ability to execute arbitrary commands on the Aviatrix Controller, leading to unauthorized control over the system and its resources.

  2. Data Breach Risks: With potential access to sensitive cloud networking configurations and data, attackers might exfiltrate confidential information, compromising organizational data integrity and privacy.

  3. Operational Disruption: The capability to execute malicious code can be leveraged to disrupt networking operations, leading to service downtime and affecting the organization’s ability to provide uninterrupted services, which can have cascading effects on business operations.

Affected Version(s)

Controller 0 < 7.1.4191

Controller 7.2.0 < 7.2.4996

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Critical 10.0 Aviatrix Controller flaw exploited in the wild

Aviatrix Controllers are prime targets because they have high-level privileges in cloud environments.

12 hours ago

Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments

Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.

21 hours ago

Crooks are popping clouds using severe Aviatrix bug

"Several cloud deployments" are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say. CVE-2024-50603 leads to remote code execution (RCE)...

1 day ago

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ’°

    Used in Ransomware

  • πŸ“°

    First article discovered by wiz.io

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.