CVE-2024-50603

CRITICAL
2025-01-08 [email protected]
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 18:02 vuln.today
Added to CISA KEV
Nov 05, 2025 - 19:11 cisa
CISA KEV
PoC Detected
Nov 05, 2025 - 19:11 vuln.today
Public exploit code
CVE Published
Jan 08, 2025 - 01:15 nvd
CRITICAL 10.0

Description

An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

Analysis

Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996 contains an OS command injection via improper neutralization of special elements in the /v1/api endpoint, allowing unauthenticated remote code execution.

Technical Context

The CWE-78 command injection in the list_flightpath_destination_instances and src_cloud_type parameters of /v1/api fails to sanitize shell metacharacters. Attackers inject OS commands that execute with the privileges of the Aviatrix Controller process.

Affected Products

['Aviatrix Controller before 7.1.4191', 'Aviatrix Controller 7.2.x before 7.2.4996']

Remediation

Update Aviatrix Controller immediately. Rotate all cloud API credentials accessible from the controller. Review cloud network configurations for unauthorized modifications. Restrict controller management interface access.

Priority Score

214
Low Medium High Critical
KEV: +50
EPSS: +94.4
CVSS: +50
POC: +20

Share

CVE-2024-50603 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy