Description
The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481.
Published: 2023-02-03
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-28628 The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481.
History

Wed, 26 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Arraynetworks Ag1000 Ag1000t Ag1000v5 Ag1100v5 Ag1150 Ag1200 Ag1200v5 Ag1500 Ag1500fips Ag1500v5 Ag1600 Ag1600v5 Arrayos Ag Vxag
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-26T14:55:05.017Z

Reserved: 2023-01-30T00:00:00.000Z

Link: CVE-2023-24613

cve-icon Vulnrichment

Updated: 2024-08-02T11:03:18.776Z

cve-icon NVD

Status : Modified

Published: 2023-02-03T02:15:07.997

Modified: 2025-03-26T15:15:47.477

Link: CVE-2023-24613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses