Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Cryptominers
Global Security

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Cryptominers

AdminBy AdminJanuary 13, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 13, 2025Ravi LakshmananVulnerability / Cloud Security

A critical security flaw has recently been discovered that affects the Aviatrix controller the cloud network platform is being actively exploited in the wild to deploy backdoors and cryptocurrency miners.

Cloud security firm Wiz said it is currently responding to “several incidents” involving weapons CVE-2024-50603 (CVSS Score: 10.0), a maximum severity bug that could lead to unauthenticated remote code execution.

In other words, successful exploitation of the flaw could allow an attacker to execute malicious operating system commands due to certain API endpoints not properly sanitizing user input. The vulnerability was fixed in versions 7.1.4191 and 7.2.4996.

Jakub Korepta, a security researcher at Polish cybersecurity company Securing, was credited with discovering and reporting the flaw. Since then, there has been a proof-of-concept (PoC) exploit. made publicly available.

Cyber ​​security

Data collected by the cybersecurity firm shows that about 3% of enterprise cloud environments have Aviatrix Controller deployed, with 65% of those showing lateral movement to administrative cloud control plane permissions. This, in turn, allows for increased privileges in the cloud environment.

“When deployed in cloud environments, AWS Aviatrix Controller allows elevation of privilege by default, making exploitation of this vulnerability high risk,” Wiz researchers Gal Nagli, Merav Bar, Gilly Tikachinsky, and Shaked Tanchuma said.

Real-world attacks using CVE-2024-50603 use initial access to target instances to mine cryptocurrency with XMRig and deploy A scrap command and control structure (C2) probably for preservation and subsequent operation.

“While we have yet to see direct evidence of cloud lateral movement, we believe it is likely that threat actors are using this vulnerability to enumerate a host’s cloud permissions and then proceed to extract data from the victim’s cloud environment,” Wiz researchers. said.

Due to active exploitation, users are advised to apply patches as soon as possible and prevent public access to the Aviatrix Controller.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.