CVE-2023-28460

7.2 HIGH

📋 TL;DR

A command injection vulnerability in Array Networks APV products allows authenticated administrators to execute arbitrary shell commands via crafted packets. This affects APV appliances running vulnerable firmware versions, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Array Networks APV (Application Delivery Controller)
Versions: All versions before 8.6.1.262 and before 10.4.2.93
Operating Systems: Array Networks proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication to exploit; affects both major firmware branches (8.x and 10.x).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root access, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, credential theft, and network foothold establishment.

🟢

If Mitigated

Limited impact due to strong authentication controls, network segmentation, and administrator account monitoring.

🌐 Internet-Facing: HIGH if administrative interfaces are exposed to internet, as authenticated attackers can exploit remotely.
🏢 Internal Only: HIGH due to authenticated administrator access requirement, making internal threats significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials; once authenticated, command injection is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.6.1.262 or newer, 10.4.2.93 or newer

Vendor Advisory: https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_Command_Injection_Vulnerabilities_APV_ID-133258.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Array Networks support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot appliance. 5. Verify version and functionality.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative interface access to trusted IP addresses only.

Configure firewall rules to restrict access to APV management interfaces

Implement Multi-Factor Authentication

all

Add MFA to administrator accounts to reduce credential compromise risk.

Configure RADIUS or TACACS+ with MFA for administrative access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate APV appliances from critical systems
  • Enforce least privilege for administrator accounts and monitor all administrative activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > About) or CLI (show version). Compare against patched versions.

Check Version:

show version (CLI) or navigate to System > About (web interface)

Verify Fix Applied:

Confirm firmware version is 8.6.1.262+ or 10.4.2.93+ and test administrative functions for stability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Command execution in system logs
  • Configuration changes from unexpected sources

Network Indicators:

  • Unexpected outbound connections from APV appliances
  • Anomalous traffic patterns to/from management interfaces

SIEM Query:

source="APV" AND (event_type="command_execution" OR user="admin" AND action="modify_config")

🔗 References

📤 Share & Export