TROYANOSYVIRUS
Voltar para CVEs

CVE-2023-28461

CRITICALCISA KEV
9.8

Descricao

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado3/15/2023
Ultima modificacao11/3/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorArray Networks
ProdutoAG/vxAG ArrayOS
Nome da vulnerabilidadeArray Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability
Data inclusao KEV2024-11-25
Prazo de remediacao2024-12-16
Uso em ransomwareKnown

Produtos afetados

arraynetworks:ag1000arraynetworks:ag1000tarraynetworks:ag1000v5arraynetworks:ag1100v5arraynetworks:ag1150arraynetworks:ag1200arraynetworks:ag1200v5arraynetworks:ag1500arraynetworks:ag1500fipsarraynetworks:ag1500v5arraynetworks:ag1600arraynetworks:ag1600v5arraynetworks:arrayos_agarraynetworks:vxag

Fraquezas (CWE)

CWE-287CWE-306

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.