CVE-2021-40870

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload malicious files and execute arbitrary code on Aviatrix Controller systems via path traversal. It affects Aviatrix Controller 6.x installations before version 6.5-1804.1922, potentially compromising the entire controller infrastructure.

💻 Affected Systems

Products:
  • Aviatrix Controller
Versions: 6.x before 6.5-1804.1922
Operating Systems: Linux-based systems running Aviatrix Controller
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to gain control of the Aviatrix Controller, potentially disrupting network operations and accessing sensitive configuration data.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though the vulnerability still exists in the software.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to any network-accessible attacker due to the unauthenticated nature of the exploit.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making this easily weaponizable by attackers with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5-1804.1922 or later

Vendor Advisory: https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Aviatrix Controller version 6.5-1804.1922 or later from the official portal. 3. Restart the controller service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Aviatrix Controller to only trusted IP addresses using firewall rules.

iptables -A INPUT -p tcp --dport 443 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Aviatrix Controller from untrusted networks
  • Deploy web application firewall (WAF) rules to block path traversal and file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check the Aviatrix Controller version via the web interface or CLI. If version is 6.x and lower than 6.5-1804.1922, it is vulnerable.

Check Version:

aviatrix_controller --version or check the web interface dashboard

Verify Fix Applied:

Verify the controller version is 6.5-1804.1922 or higher and test that file upload functionality properly validates file types and paths.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts to controller endpoints
  • Path traversal patterns in HTTP requests
  • Execution of unexpected system commands

Network Indicators:

  • Unusual outbound connections from the controller
  • File upload requests to controller from unauthenticated sources

SIEM Query:

source="aviatrix_controller" AND (http_uri="*../*" OR http_method="POST" AND http_uri="*/upload*")

🔗 References

📤 Share & Export