Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw

This post was originally published on IT Pro Today

Multiple threat actors are actively targeting a recently disclosed maximum-severity security bug in the Aviatrix Controller centralized management platform for cloud networking.

In a worst-case scenario, the vulnerability, identified as CVE-2024-50603 (CVSS 10) could allow an unauthenticated remote adversary to run arbitrary commands on an affected system and take full control of it. Attackers are currently exploiting the flaw to deploy XMRig cryptomining malware and the Sliver backdoor on vulnerable targets.

CVE-2024-50603: A High-Impact Vulnerability

The vulnerability presents an especially severe risk in Amazon Web Services (AWS) cloud environments, where Aviatrix Controller allows privilege escalation by default, researchers at Wiz Security warned in a blog on Jan. 10.

“Based on our data, around 3% of cloud enterprise environments have Aviatrix Controller deployed,” the researchers noted. “In 65% of such environments, the virtual machine hosting Aviatrix Controller has a lateral movement path to administrative cloud control plane permissions.”

Hundreds of large companies use Aviatrix’s technology to manage cloud networking across AWS, Azure, Google Cloud Platform (GCP), and other multi-cloud environments. Common use cases include automating the deployment and management of cloud network infrastructure, and managing security, encryption, and connectivity policies. The company lists organizations such as Heineken, Raytheon, Yara, and IHG Hotels and Resorts among its customers.

<p data-component="related-article"

Read the rest of this post, which was originally published on IT Pro Today.

Previous Post

Open Source Trends and Predictions 2025 From Industry Insiders

Next Post

Storage Considerations for VMware Cloud Foundation with FlashArray