Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28461: n/a

0
Critical
VulnerabilityCVE-2023-28461cvecve-2023-28461
Published: Wed Mar 15 2023 (03/15/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."

AI-Powered Analysis

AILast updated: 10/28/2025, 22:57:46 UTC

Technical Analysis

CVE-2023-28461 is a critical security vulnerability affecting Array Networks Array AG Series and vxAG SSL VPN appliances running firmware version 9.4.0.481 and earlier. This vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the SSL VPN gateway. The attack vector involves sending a specially crafted HTTP request containing a 'flags' attribute in the header, which enables the attacker to browse the underlying filesystem of the VPN gateway without any authentication. Following this reconnaissance, the attacker can exploit a vulnerable URL endpoint to achieve remote code execution (RCE). The vulnerability stems from improper access control (CWE-306), allowing unauthorized access to sensitive system functions. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact includes full compromise of confidentiality, integrity, and availability of the affected device, potentially allowing attackers to pivot into internal networks, intercept or manipulate VPN traffic, and disrupt remote access services. As of the vendor advisory dated March 9, 2023, a patch was forthcoming but not yet available at the time of this report. No known exploits in the wild have been reported yet, but the ease of exploitation and critical impact make this a high-priority threat.

Potential Impact

For European organizations, this vulnerability poses a severe risk to secure remote access infrastructure. SSL VPN gateways are critical for enabling remote workforce connectivity and protecting internal networks. Exploitation could lead to full compromise of the VPN appliance, allowing attackers to access internal corporate resources, intercept sensitive communications, and deploy further malware or ransomware. This could disrupt business continuity, lead to data breaches involving personal and corporate data protected under GDPR, and damage organizational reputation. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly vulnerable due to their reliance on secure VPN access and the high value of their data. Additionally, the lack of authentication requirement increases the attack surface, potentially enabling widespread scanning and exploitation attempts from external threat actors.

Mitigation Recommendations

1. Immediately restrict network access to the management interfaces of Array AG Series and vxAG appliances using firewall rules or network segmentation to limit exposure to trusted IP addresses only. 2. Monitor VPN gateway logs and network traffic for unusual HTTP requests containing suspicious headers or access patterns indicative of exploitation attempts. 3. Apply vendor patches as soon as they become available; prioritize patching in all environments, especially production and internet-facing devices. 4. If patching is delayed, consider temporary mitigations such as disabling vulnerable services or applying web application firewall (WAF) rules to block malicious HTTP headers or URLs. 5. Conduct thorough audits of VPN appliance configurations and ensure strong authentication and access controls are in place for administrative interfaces. 6. Educate security teams to recognize indicators of compromise related to this vulnerability and prepare incident response plans for potential exploitation. 7. Engage with vendors and security communities for updates and threat intelligence related to this CVE.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-03-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a8247d717aace2191b

Added to database: 10/21/2025, 7:06:16 PM

Last enriched: 10/28/2025, 10:57:46 PM

Last updated: 10/30/2025, 3:48:21 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats