Gadget Insiders
  • Android
  • Apple
  • Gaming
  • iOS
  • PC
  • Phones
  • Playstation
  • Reviews
  • Samsung
  • Xbox
No Result
View All Result
  • Android
  • Apple
  • Gaming
  • iOS
  • PC
  • Phones
  • Playstation
  • Reviews
  • Samsung
  • Xbox
No Result
View All Result
Gadget Insiders
No Result
View All Result
Home Scams/Hacks

Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors

Prashant Chaudhary by Prashant Chaudhary
January 15, 2025
in Scams/Hacks, News
Reading Time: 2 mins read
0
Breaking News Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors

A significant vulnerability in the Aviatrix Controller cloud networking platform, known for its widespread use in enterprise cloud environments, has recently become the target of malicious actors. Researchers from the cloud security firm Wiz have been actively responding to multiple incidents where this vulnerability has been exploited to deploy dangerous backdoors and cryptocurrency miners.

Breaking News Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors-
Hackers exploit critical security flaw

The Discovery and Response

Jakub Korepta, a dedicated security researcher at the Polish cybersecurity company Securing, initially uncovered the flaw, which was subsequently made public. Identified as CVE-2024-50603, this bug boasts a critical CVSS score of 10.0 due to its potential for unauthenticated remote code execution. In simpler terms, the flaw allows hackers to execute malicious commands across certain API endpoints that fail to properly sanitize user input. The vulnerability has since been patched in versions 7.1.4191 and 7.2.4996, following its discovery and a proof-of-concept (PoC) exploit released to the public.

Breaking News Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors--
Cloud vulnerability sparks major risk

The Exploitation: From Cryptocurrency Mining to Data Exfiltration

The real-world application of this vulnerability has seen cybercriminals deploying the Sliver command-and-control (C2) framework and utilizing the XMRig tool to mine cryptocurrency. These attacks are particularly dangerous because they exploit initial access to escalate privileges and potentially exfiltrate data from cloud environments. Wiz researchers Gal Nagli, Merav Bar, Gili Tikochinski, and Shaked Tanchuma noted, “While we have yet to see direct evidence of cloud lateral movement, it’s likely that threat actors are using this exploit to survey the cloud permissions of the host and then pivot to other malicious activities.”

Breaking News Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors---
Cryptocurrency miners target enterprises

Urgent Call to Action: Patch and Secure

In response to these ongoing threats, users of Aviatrix Controller are urged to apply the recommended patches immediately and limit public access to the vulnerable controllers. Aviatrix has proactively addressed the security gap by issuing a hot patch in November for various software versions, some of which had been out of support for nearly two years.

Aviatrix’s Commitment to Security

Following the patch release, Aviatrix has not only remedied the flaw but has also engaged in extensive outreach to ensure that their clients implement these crucial updates. “Our goal was 100% coverage, and we were gratified to see a significant portion of our customer base patched and hardened before we disclosed the vulnerability publicly on January 7th,” Aviatrix stated. The company continues to work closely with affected customers to restore their software to a secure state.

Breaking News Major Security Flaw in Aviatrix Platform Fixed After Hackers Install Crypto Miners and Backdoors----
Urgent patch required for safety

This incident underscores the critical need for ongoing vigilance and proactive security measures in protecting cloud environments. As cloud technologies become increasingly integral to corporate infrastructure, the responsibility to safeguard them against evolving cybersecurity threats grows. Enterprises are encouraged to stay ahead of potential threats by maintaining up-to-date software and adhering to best security practices.

Tags: Aviatrix vulnerabilitycloud-securitycrypto miningCVE-2024-50603Cybersecuritypatch updateremote code execution

TRENDING

Google’s Gemini AI to Transform Your Car with Android Auto

Google’s Gemini AI to Transform Your Car with Android Auto

May 15, 2025
Google Set to Launch Pinterest-Like Feature at I/O 2025 to Change How We Search

Google Set to Launch Pinterest-Like Feature at I/O 2025 to Change How We Search

May 15, 2025
Samsung's New Galaxy S25 Edge Is the Slimmest Smartphone Yet – A Bold Move to Beat Apple

Samsung’s New Galaxy S25 Edge Is the Slimmest Smartphone Yet – A Bold Move to Beat Apple

May 15, 2025
60+ Gaming Consoles and Platforms Compared

60+ Gaming Consoles and Platforms Compared

May 15, 2025
75+ Smart Home Gadgets That Work with Google Home

75+ Smart Home Gadgets That Work with Google Home

May 15, 2025
iOS 19 Aims to Fix Bugs and Introduce a Fresh Look – What We Can Expect

iOS 19 Aims to Fix Bugs and Introduce a Fresh Look – What We Can Expect

May 15, 2025
Nintendo’s New EULA Update Makes It Harder for Users to Sue Over Issues Like Joy-Con Drift

Nintendo’s New EULA Update Makes It Harder for Users to Sue Over Issues Like Joy-Con Drift

May 11, 2025
LegoGPT Lets You Create Real Lego Designs from Text – Here’s How It Works

LegoGPT Lets You Create Real Lego Designs from Text – Here’s How It Works

May 11, 2025
  • Contact Us
  • Terms
  • Privacy
  • Copyright
  • About Us
  • Fact Checking Policy
  • Corrections Policy
  • Ethics Policy

Copyright © 2023 GadgetInsiders.com

No Result
View All Result
  • Android
  • Apple
  • Gaming
  • iOS
  • PC
  • Phones
  • Playstation
  • Reviews
  • Samsung
  • Xbox

Copyright © 2023 GadgetInsiders.com.