TROYANOSYVIRUS
Volver a CVEs

CVE-2023-28461

CRITICALCISA KEV
9.8

Descripcion

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/15/2023
Ultima modificacion11/3/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorArray Networks
ProductoAG/vxAG ArrayOS
Nombre vulnerabilidadArray Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability
Fecha inclusion KEV2024-11-25
Fecha limite remediacion2024-12-16
Uso en ransomwareKnown

Productos afectados

arraynetworks:ag1000arraynetworks:ag1000tarraynetworks:ag1000v5arraynetworks:ag1100v5arraynetworks:ag1150arraynetworks:ag1200arraynetworks:ag1200v5arraynetworks:ag1500arraynetworks:ag1500fipsarraynetworks:ag1500v5arraynetworks:ag1600arraynetworks:ag1600v5arraynetworks:arrayos_agarraynetworks:vxag

Debilidades (CWE)

CWE-287CWE-306

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.