CVE-2023-28461

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:arraynetworks:arrayos_ag:*:*:*:*:*:*:*:*
OR cpe:2.3:h:arraynetworks:ag1000:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1000t:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1000v5:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1100v5:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1150:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1200:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1200v5:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1500:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1500fips:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1500v5:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1600:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:ag1600v5:-:*:*:*:*:*:*:*
cpe:2.3:h:arraynetworks:vxag:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-03-15 23:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-28461

Mitre link : CVE-2023-28461

CVE.ORG link : CVE-2023-28461


JSON object : View

Products Affected

arraynetworks

  • ag1200
  • ag1600v5
  • ag1500v5
  • vxag
  • ag1500
  • ag1100v5
  • ag1500fips
  • ag1000t
  • ag1150
  • ag1600
  • arrayos_ag
  • ag1000
  • ag1000v5
  • ag1200v5
CWE
CWE-287

Improper Authentication