CISA Known Exploited Vulnerability (KEV)
Aviatrix Controllers OS Command Injection Vulnerability
January 16, 2025
February 6, 2025
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
References
- https://docs.aviatrix.com/documentation/latest/network-security/index.html
- https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true#remote-code-execution-vulnerability-in-aviatrix-controllers
- https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/
Weakness Enumeration
CWE-ID | CWE Name |
---|---|
CWE-78 |
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) |