CVE-2023-28461
📋 TL;DR
CVE-2023-28461 is a critical remote code execution vulnerability in Array Networks AG Series and vxAG SSL VPN gateways. Attackers can exploit this without authentication by manipulating HTTP headers to browse the filesystem and execute arbitrary code. Organizations using affected versions of these VPN appliances are at risk.
💻 Affected Systems
- Array Networks AG Series
- Array Networks vxAG
📦 What is this software?
Arrayos Ag by Arraynetworks
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the VPN gateway allowing attackers to pivot into internal networks, steal credentials, deploy ransomware, or establish persistent backdoors.
Likely Case
Data exfiltration, credential harvesting from VPN users, and lateral movement into connected internal networks.
If Mitigated
Limited impact if network segmentation isolates the VPN gateway and strong monitoring detects exploitation attempts.
🎯 Exploit Status
CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The vulnerability requires no authentication and has simple exploitation vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 9.4.0.481 (specific fixed version not specified in advisory)
Restart Required: Yes
Instructions:
1. Contact Array Networks support for the fixed release. 2. Backup current configuration. 3. Apply the firmware update. 4. Reboot the appliance. 5. Verify functionality post-update.
🔧 Temporary Workarounds
Network Access Control
allRestrict access to the VPN gateway management interface to trusted IP addresses only
Configure firewall rules to allow only specific source IPs to access the VPN gateway on management ports
WAF/IPS Mitigation
allDeploy web application firewall or intrusion prevention system rules to block malicious HTTP headers
Configure WAF/IPS to block requests containing suspicious flags attributes in HTTP headers
🧯 If You Can't Patch
- Isolate the VPN gateway in a dedicated network segment with strict egress filtering
- Implement enhanced monitoring for unusual file access patterns or unauthorized process execution on the appliance
🔍 How to Verify
Check if Vulnerable:
Check the firmware version via the web admin interface or CLI. If version is 9.4.0.481 or earlier, the system is vulnerable.
Check Version:
From CLI: show version | include AG
Verify Fix Applied:
Verify firmware version is newer than 9.4.0.481 and test that HTTP header manipulation no longer allows filesystem access.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests with flags attributes in headers
- Unexpected file access patterns in system logs
- Unauthorized process execution events
Network Indicators:
- HTTP requests to VPN gateway with manipulated headers
- Unusual outbound connections from VPN appliance
SIEM Query:
source="vpn-gateway" AND (http_header="*flags*" OR process="unexpected_executable")
🔗 References
- https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf
- https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28461