Vulnerabilities
Vulnerable Software
Arraynetworks:  >> Vxag  Security Vulnerabilities
CVE-2025-66644
Known exploited
Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.
CVSS Score
7.2
EPSS Score
0.031
Published
2025-12-05
MotionPro in Array ArrayOS AG before 9.4.0.505 on AG and vxAG allows remote command execution via crafted packets. AG and vxAG 9.3.0.259.x are unaffected.
CVSS Score
9.8
EPSS Score
0.026
Published
2023-12-22
Array AG OS before 9.4.0.499 allows denial of service: remote attackers can cause system service processes to crash through abnormal HTTP operations.
CVSS Score
7.5
EPSS Score
0.007
Published
2023-08-25
CVE-2023-28461
Known exploited
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
CVSS Score
9.8
EPSS Score
0.872
Published
2023-03-15
The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481.
CVSS Score
4.9
EPSS Score
0.004
Published
2023-02-03
Array Networks AG/vxAG with ArrayOS AG before 9.4.0.469 allows unauthenticated command injection that leads to privilege escalation and control of the system. NOTE: ArrayOS AG 10.x is unaffected.
CVSS Score
9.8
EPSS Score
0.029
Published
2022-10-13


Contact Us

Shodan ® - All rights reserved