Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2023-03-15T00:00:00
Updated: 2024-08-02T12:38:25.279Z
Reserved: 2023-03-15T00:00:00
Link: CVE-2023-28461
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-03-15T23:15:10.070
Modified: 2024-11-21T07:55:07.930
Link: CVE-2023-28461
Redhat
No data.