Overview

A critical security vulnerability has been discovered in the Aviatrix Controller cloud networking platform, identified as CVE-2024-50603 with a CVSS score of 10.0. The flaw enables unauthenticated remote code execution through inadequately sanitized API endpoints

Whom it may concern

  • Cloud infrastructure administrators
  • Security operations teams
  • Cloud security architects
  • Federal civilian agencies (FCEB)

Key Findings

  1. Active exploitation observed deploying XMRig cryptocurrency miners
  1. 65% of deployments show lateral movement paths to admin privileges
  1. Sliver C2 framework being deployed for persistence
  1. Affects approximately 3% of cloud enterprise environments

Risk Analysis

  • Probability: High - Public PoC available
  • Impact: Critical - Enables full system compromise
  • Attack Surface: ~3% of cloud enterprises exposed
  • Exploitation Complexity: Low - Unauthenticated access required

Action Items

  • Immediately upgrade to versions 7.1.4191 or 7.2.4996
  • Implement network access controls to restrict controller access
  • Remove public access to Aviatrix Controller instances
  • Complete patches by February 6, 2025 (FCEB requirement)

Sources

  • [The Hacker News](https://thehackernews.com/2025/01/hackers-exploit-aviatrix-controller.html)
Share this article

Stay up to date

Join my community and receive the latest risk news and trends.