9.8

CVE-2025-66644

Warnung
Medienbericht
Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArraynetworksArrayos Ag Version < 9.4.5.9
   ArraynetworksAg1000 Version-
   ArraynetworksAg1000t Version-
   ArraynetworksAg1000v5 Version-
   ArraynetworksAg1100 Version-
   ArraynetworksAg1100v5 Version-
   ArraynetworksAg1150 Version-
   ArraynetworksAg1200 Version-
   ArraynetworksAg1200v5 Version-
   ArraynetworksAg1500 Version-
   ArraynetworksAg1500fips Version-
   ArraynetworksAg1500v5 Version-
   ArraynetworksAg1600 Version-
   ArraynetworksAg1600v5 Version-
   ArraynetworksVxag Version-

08.12.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Array Networks ArrayOS AG OS Command Injection Vulnerability

Schwachstelle

Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.51% 0.872
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cve@mitre.org 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.