Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-28461

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.898
EPSS Ranking 99.5%
CVSS Severity
CVSS v3 Score 9.8
Proposed Action
Array Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.
Ransomware Campaign
Known
Products affected by CVE-2023-28461


Contact Us

Shodan ® - All rights reserved