Aviatrix Controller CVE-2025-2171

| EUVD-2025-18917 HIGH
Improper Restriction of Excessive Authentication Attempts (CWE-307)
2025-06-23 [email protected]
7.8
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:P
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-18917
CVE Published
Jun 23, 2025 - 14:15 nvd
HIGH 7.8

DescriptionNVD

Aviatrix Controller versions prior to 7.1.4208, 7.2.5090, and 8.0.0 do not enforce rate limiting on password reset attempts, allowing adversaries to brute force guess the 6-digit password reset PIN

AnalysisAI

Aviatrix Controller versions before 7.1.4208, 7.2.5090, and 8.0.0 lack rate limiting on password reset PIN attempts, allowing unauthenticated attackers to brute force 6-digit PINs over the network without authentication or user interaction. This vulnerability is characterized as having exploitation probability (E:P in CVSS vector) and enables complete account takeover via password reset bypass, affecting all Aviatrix Controller deployments in vulnerable versions.

Technical ContextAI

This vulnerability exploits a missing rate-limiting control on the password reset functionality in Aviatrix Controller, a multi-cloud network infrastructure platform. The root cause is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts), which describes insufficient protections against brute force attacks on authentication mechanisms. Aviatrix Controller's password reset mechanism generates 6-digit numeric PINs (1,000,000 possible combinations) and transmits them to users; without rate limiting, an attacker can programmatically attempt all combinations from an unauthenticated network position (AV:N). The PIN validation endpoint fails to implement exponential backoff, account lockouts, CAPTCHA challenges, or request throttling. This is a network-accessible authentication bypass rather than a cryptographic weakness—the PIN itself may be weak but is rendered exploitable specifically due to the absence of rate limiting.

RemediationAI

Immediate actions: (1) Upgrade to patched versions: Controller 7.1.4208 or later, 7.2.5090 or later, or 8.0.1+ (exact 8.x patch version TBD pending vendor release); (2) If immediate patching is not feasible, implement network-level mitigations: rate limit password reset endpoint at WAF/load balancer (e.g., max 5 requests per minute per IP), implement per-user lockout after 3-5 failed attempts, add CAPTCHA to reset flow; (3) Monitor authentication logs for suspicious PIN attempt patterns (rapid sequential guesses from single IP); (4) Enforce MFA/2FA on all Controller admin accounts to add defense-in-depth. Consult Aviatrix security advisory for confirmed patch release dates and upgrade procedures. Prioritize patching given active exploitation risk.

Share

CVE-2025-2171 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy