The Register: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug

Source URL: https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/
Source: The Register
Title: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug

Feedly Summary: This is what happens when you publish PoCs immediately
“Several cloud deployments" are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.…

AI Summary and Description: Yes

Summary: The text discusses a critical security vulnerability (CVE-2024-50603) in the Aviatrix Controller affecting AWS deployments, which could allow remote code execution and privilege escalation. With a proof-of-concept exploit publicly available shortly after the vulnerability’s disclosure, it poses a significant threat to cloud security. The article highlights the risks involved and suggests preventative measures for organizations using the affected software.

Detailed Description:

The text highlights a significant security concern regarding the Aviatrix Controller, which is in use by approximately 3% of AWS customers. Researchers from Wiz have identified a maximum-severity vulnerability (CVE-2024-50603) that allows remote code execution, enabling unauthenticated threat actors to potentially escalate their privileges and compromise cloud environments. The discovery and subsequent publication of a proof-of-concept exploit shortly after the vulnerability’s disclosure pose immediate challenges for cloud security.

Key Points:

– **Vulnerability Impact**:
– CVE-2024-50603 enables remote code execution and leads to privilege escalation in AWS environments.
– 65% of cloud deployments using Aviatrix Controller are susceptible to lateral movement, allowing attackers to gain admin permissions.

– **Timing of Disclosure**:
– The vulnerability was disclosed on January 7, with a proof-of-concept becoming available within 24 hours, optimizing opportunities for threat actors while giving defenders limited time to respond.

– **Recent Incident Analysis**:
– Since January 7, successful exploits have led to the deployment of malware, including backdoor installations and cryptojacking incidents.
– Threat actors may be collecting cloud permissions for potential future data exfiltration and extortion.

– **Defender Recommendations**:
– Users are encouraged to upgrade to version 7.2.4996 or later, ensuring they are not impacted by the vulnerability.
– It is advised to restrict public access to the controller, potentially mitigating risk until patches are fully applied.

– **Patch Persistence Issues**:
– Aviatrix noted that patches may not persist after version upgrades, requiring extra attention from users implementing security updates.

Overall, this news underscores the critical importance of proactive cloud security measures, including immediate patch management and restricting unwarranted internet exposure. The detailed findings from Wiz serve as a crucial reminder for security and compliance professionals to prioritize vigilance when managing cloud deployments.