9.8

CVE-2023-28461

Warnung
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArraynetworksArrayos Ag Version <= 9.4.0.481
   ArraynetworksAg1000 Version-
   ArraynetworksAg1000t Version-
   ArraynetworksAg1000v5 Version-
   ArraynetworksAg1100v5 Version-
   ArraynetworksAg1150 Version-
   ArraynetworksAg1200 Version-
   ArraynetworksAg1200v5 Version-
   ArraynetworksAg1500 Version-
   ArraynetworksAg1500fips Version-
   ArraynetworksAg1500v5 Version-
   ArraynetworksAg1600 Version-
   ArraynetworksAg1600v5 Version-
   ArraynetworksVxag Version-

25.11.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability

Schwachstelle

Array Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 87.18% 0.994
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

CWE-306 Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.