First published: Wed Jan 08 2025(Updated: )
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aviatrix Controllers | ||
Aviatrix Controllers | <7.1.4191 | |
Aviatrix Controllers | >=7.2<7.2.4996 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50603 is classified as a critical vulnerability due to its potential for unauthorized remote code execution.
To fix CVE-2024-50603, upgrade Aviatrix Controller to version 7.1.4191 or later or 7.2.4996 or later.
CVE-2024-50603 affects Aviatrix Controller versions prior to 7.1.4191 and 7.2.x prior to 7.2.4996.
CVE-2024-50603 can allow an unauthenticated attacker to execute arbitrary commands on vulnerable systems.
If you cannot upgrade, consider isolating affected systems and monitoring for unauthorized access until a patch is applied.