Array Networks Array AG Series and vxAG (9.4.0.481 and...
Critical severity
Unreviewed
Published
Mar 16, 2023
to the GitHub Advisory Database
•
Updated Nov 25, 2024
Description
Published by the National Vulnerability Database
Mar 15, 2023
Published to the GitHub Advisory Database
Mar 16, 2023
Last updated
Nov 25, 2024
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
References