Cloud Security

Attackers Exploit Aviatrix Controller Flaw In The Wild

Classification of cloud data

Cryptojacking and backdoor compromise have been achieved by threat actors through the ongoing targeting of vulnerable Aviatrix Controllers by the now-addressed maximum severity remote code execution flaw, tracked as CVE-2024-50603, SC Media reports.

Wiz researchers said 65% of the nearly 3% of cloud enterprise environments that use Aviatrix Controllers to manage multi-cloud environments had lateral movement to admin control plane permissions, presenting a significant risk for privilege escalation following initial compromise.

Attackers were also noted by former National Security Agency cyber expert Evan Dornbush to potentially exploit the API endpoint issue to facilitate not only proprietary data compromise and denial-of-service, but also malware delivery and total server breaches.

The vulnerability's threat to organizational data has also been echoed by Opus Security co-founder and CEO Meny Har: "With regards to patching, a patch has indeed been made available to address this vulnerability. However, the urgency now is for security teams to implement this patch across all affected environments promptly. Since there’s evidence of this vulnerability being actively exploited, the associated risks significantly increases and this necessitates immediate action to secure the impacted environments."

An In-Depth Guide to Cloud Security

Get essential knowledge and practical strategies to fortify your cloud security.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.