SB2025062450 - Multiple vulnerabilities in Aviatrix Controller
Published: June 24, 2025 Updated: June 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper control of interaction frequency (CVE-ID: CVE-2025-2171)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to missing brute-force protection in the password reset feature that generates a 6 digit code for password recovery. A remote attacker can guess the temporary code and gain unauthorized access to the application.
2) OS Command Injection (CVE-ID: CVE-2025-2172)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://cloud.google.com/blog/topics/threat-intelligence/remote-code-execution-aviatrix-controller
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0003.md
- https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html#multiple-vulnerabilities-in-aviatrix-controllers
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0004.md