Uncategorized

Aviatrix Cloud Controller Authentication Vulnerabilities Allows Remote Code Execution by Attackers

A two severe security vulnerabilities in Aviatrix Controller, a popular Software-Defined Networking (SDN) utility used to create links between different cloud vendors and regions.

The vulnerabilities, tracked as CVE-2025-2171 and CVE-2025-2172, allowed researchers to bypass authentication and gain root-level command execution on a fully patched system, potentially compromising connected cloud environments.

The first vulnerability (CVE-2025-2171) exploited a fundamental weakness in Aviatrix’s password reset mechanism.

Researchers discovered that when initiating a password reset for an administrator account, the system generated a 6-digit token with insufficient entropy – using numbers between 111,111 and 999,999, creating just 888,888 possible combinations.

Identifying a valid password reset token

More critically, the system lacked rate limiting protections against brute force attempts. Though tokens expired after 15 minutes, Mandiant demonstrated that the limited keyspace could be successfully brute-forced within this windows.

The Red Team successfully exploited a fully patched Aviatrix Controller via authentication bypass, unsafe file upload, and argument injection.

Exploitation steps

After 16 hours of automated attempts (resetting the process every 15 minutes), researchers successfully compromised the administrator account.

“This gave us access to a plethora of cloud features, ranging from deploying OpenVPN configurations, creating users, obtaining user hashed credentials, reading from a local MongoDB, and more,” the researchers noted.

Aviatrix Cloud Controller

With administrator access secured, researchers identified a second vulnerability (CVE-2025-2172) in the Controller’s file handling system.

The vulnerability stemmed from insecure processing of uploaded filenames containing tab characters, which weren’t properly sanitized.

The vulnerability exploited how the Python shlex module processes command strings. By crafting filenames with embedded tab characters, researchers could “smuggle” unexpected arguments to the underlying “cp” command that ran with root privileges via sudo.

LLM generated pseudocode for the reset_password action

“By carefully reading the man pages, we found this interesting argument: -S, –suffix=SUFFIX override the usual backup suffix,” researchers explained.

This allowed them to manipulate file paths and ultimately write a malicious crontab file to the /etc directory, establishing persistent root access to the Controller system.

Cloud Security Implications

The vulnerabilities highlighted significant risks for organizations using Aviatrix to manage multi-cloud environments.

Once compromised, attackers could pivot from the Controller to access connected cloud resources.

Mandiant demonstrated this by accessing the AWS IMDSv2 endpoint from the compromised Controller to obtain cloud credentials.

By performing an additional role assumption, they gained privileged access to EC2 instances, S3 buckets, and other AWS resources.

Aviatrix has patched these vulnerabilities in versions 8.0.0, 7.2.5090, and 7.1.4208. Organizations using Aviatrix Controller version 7.2.5012 or earlier should update immediately to prevent exploitation.

The discovery emphasizes how centralized network management systems can become prime targets for attackers seeking to compromise cloud environments.

As Mandiant noted, “Incidentally, compromising the Controller would mean having access to the centralized component which accesses all these cloud gateways and cloud APIs, making it a prime target for attackers”.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago