TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2023-28461

CRITICALCISA KEV
9.8

Beschreibung

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/15/2023
Zuletzt geandert11/3/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerArray Networks
ProduktAG/vxAG ArrayOS
SchwachstellennameArray Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability
KEV Aufnahmedatum2024-11-25
Behebungsfrist2024-12-16
Ransomware-NutzungKnown

Betroffene Produkte

arraynetworks:ag1000arraynetworks:ag1000tarraynetworks:ag1000v5arraynetworks:ag1100v5arraynetworks:ag1150arraynetworks:ag1200arraynetworks:ag1200v5arraynetworks:ag1500arraynetworks:ag1500fipsarraynetworks:ag1500v5arraynetworks:ag1600arraynetworks:ag1600v5arraynetworks:arrayos_agarraynetworks:vxag

Schwachen (CWE)

CWE-287CWE-306

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.