Hacker nutzen kritischen Fehler in SSL-VPN-Produkten von Array Networks aus

Teilen:

America’s cyber defense agency has received evidence of hackers actively exploiting a remote code execution vulnerability in SSL VPN products Array Networks AG and vxAG ArrayOS.

The security issue is tracked as CVE-2023-28461 and has been assigned a critical 9.8 severity score and the agency has included it to the catalog of Known Exploited Vulnerabilities (KEV).

The bug can be exploited through a vulnerable URL and is an improper authentication issue that allows remote code execution in Array AG Series and vxAG version 9.4.0.481 and earlier.

“(CVE-2023-28461 is) […] a web security vulnerability that allows an attacker to browse the filesystem or execute remote code on the SSL VPN gateway using flags attribute in HTTP header without authentication,” the vendor says in a security bulletin.

The flaw was disclosed last year on March 9 and Array Networks fixed it about a week later with release of Array AG release 9.4.0.484.

Array Networks AG Series (hardware appliances) and vxAG Series (virtual appliances) are SSL VPN products offer secure remote and mobile access to corporate networks, enterprise applications, and cloud services.

According to the vendor, they are used by over 5,000 customers worldwide, including enterprises, service providers, and government agencies.

CISA  has not provided any details on who is taking advantage of the vulnerability and targeted organizations but added it to the Known Exploited Vulnerabilities (KEV) catalog “based on evidence of active exploitation.”

The agency recommends that all federal agencies and critical infrastructure organizations either apply security updates and available mitigations by December 16 or stop using the product.

Security updates for the impacted products are available through the Array support portal. The vendor also provides in the security advisory a set of commands to mitigate the vulnerability if updates cannot be installed immediately.

However, organizations should first test the effect of the commands as they may have a negative impact on the functionality of Client Security, the VPN client’s ability to upgrade automatically, and the Portal User Resource function.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
12:52 am, Feb. 3, 2025
Wetter-Symbol 1°C
L: -1° | H: 3°
overcast clouds
Luftfeuchtigkeit: 93 %
Druck: 1025 mb
Wind: 3 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 96%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:35 am
Sonnenuntergang: 4:53 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
-1° | 3°°C 0 mm 0% 9 mph 95 % 1025 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
6° | 10°°C 0.2 mm 20% 14 mph 96 % 1026 mb 0 mm/h
Mi. Feb. 05 9:00 pm
Wetter-Symbol
4° | 8°°C 0 mm 0% 8 mph 89 % 1045 mb 0 mm/h
Do. Feb. 06 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 9 mph 82 % 1045 mb 0 mm/h
Fr. Feb. 07 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 10 mph 95 % 1038 mb 0 mm/h
Today 3:00 am
Wetter-Symbol
2° | 3°°C 0 mm 0% 4 mph 91 % 1025 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 4 mph 93 % 1025 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 93 % 1025 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
7° | 7°°C 0 mm 0% 9 mph 94 % 1023 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 5 mph 95 % 1024 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 5 mph 95 % 1024 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 6 mph 95 % 1024 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,959.06
-5.02%
Ethereum(ETH)
€2,741.72
-10.96%
Fesseln(USDT)
€0.98
-0.03%
XRP(XRP)
€2.29
-20.07%
Solana(SOL)
€191.20
-9.68%
USDC(USDC)
€0.98
-0.01%
Dogecoin(DOGE)
€0.247628
-18.85%
Shiba Inu(SHIB)
€0.000015
-17.35%
Pepe(PEPE)
€0.000010
-18.16%
Nach oben scrollen