Lateral movement capability makes this a tasty target for attackers.
A critical code execution flaw in the Aviatrix Controller with a 10.0 CVSS score has been exploited in the wild.
According to researchers from Wiz said that the vulnerability is especially serious as Aviatrix Controllers are a "prime target" for threat actors since they manage and connect multi-cloud environments. The controllers also have high-level privileges, SC US reports.
“Based on our data, around three percent of cloud enterprise environments have Aviatrix Controller deployed,” the Wiz researchers found. “However, our data shows that in 65 percent of such environments, the virtual machines hosting Aviatrix Controller have a lateral movement path to administrative control plane permissions.”
The researchers added that this lateral movement makes Aviatrix Controller a vulnerable target for threat actors who aim to move laterally and escalate their privileges in the cloud environment once they gain initial access to the controller via the exploitation of the RCE.
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.