A command injection vulnerability was discovered in Array Networks APV products. A remote attacker can send a crafted packet after logging into the affected appliance as an administrator, resulting in arbitrary shell code execution. This is fixed in 8.6.1.262 or newer and 10.4.2.93 or newer.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_Command_Injection_Vulnerabilities_APV_ID-133258.pdf - Vendor Advisory |
Information
Published : 2023-03-15 23:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28460
Mitre link : CVE-2023-28460
CVE.ORG link : CVE-2023-28460
JSON object : View
Products Affected
arraynetworks
- apv5800
- apv2600v5
- apv800
- apv1600v5
- apv7800
- apv6600
- apv3600
- apv3650
- apv6600fips
- array_os
- apv10650
- apv1600t
- apv2800
- apv5600
- apv1600
- apv11600
- apv7600
- apv1800
- apv3600v5
- apv2600
- vapv
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')