TROYANOSYVIRUS
Retour aux CVEs

CVE-2023-28461

CRITICALCISA KEV
9.8

Description

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/15/2023
Derniere modification11/3/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurArray Networks
ProduitAG/vxAG ArrayOS
Nom vulnerabiliteArray Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability
Date ajout KEV2024-11-25
Date limite remediation2024-12-16
Utilise dans ransomwareKnown

Produits affectes

arraynetworks:ag1000arraynetworks:ag1000tarraynetworks:ag1000v5arraynetworks:ag1100v5arraynetworks:ag1150arraynetworks:ag1200arraynetworks:ag1200v5arraynetworks:ag1500arraynetworks:ag1500fipsarraynetworks:ag1500v5arraynetworks:ag1600arraynetworks:ag1600v5arraynetworks:arrayos_agarraynetworks:vxag

Faiblesses (CWE)

CWE-287CWE-306

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.