CVE-2023-41121
📋 TL;DR
This vulnerability in Array AG OS allows remote attackers to cause denial of service by crashing system service processes through abnormal HTTP operations. It affects Array Networks devices running Array AG OS versions before 9.4.0.499. Organizations using vulnerable Array Networks appliances are at risk.
💻 Affected Systems
- Array Networks AG Series appliances
📦 What is this software?
Arrayos Ag by Arraynetworks
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of Array Networks appliance, affecting all services it provides (load balancing, VPN, firewall, etc.), potentially causing extended downtime for dependent applications.
Likely Case
Intermittent service disruptions affecting specific services on the appliance, requiring manual intervention to restart crashed processes or reboot the device.
If Mitigated
Limited impact with proper network segmentation and monitoring, allowing quick detection and response to service disruptions.
🎯 Exploit Status
The advisory mentions 'abnormal HTTP operations' which suggests relatively simple exploitation. No authentication required makes this easily weaponizable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.4.0.499 and later
Restart Required: Yes
Instructions:
1. Download Array AG OS version 9.4.0.499 or later from Array Networks support portal. 2. Backup current configuration. 3. Upload and install the new firmware via web interface or CLI. 4. Reboot the appliance after installation completes. 5. Verify services are running properly post-upgrade.
🔧 Temporary Workarounds
HTTP Traffic Filtering
allImplement WAF or network filtering to block abnormal HTTP requests that could trigger the vulnerability
Service Monitoring and Auto-restart
allConfigure monitoring to detect crashed services and automatically restart them
🧯 If You Can't Patch
- Implement strict network segmentation to limit access to Array appliance management interfaces
- Deploy intrusion detection systems to monitor for abnormal HTTP patterns and block suspicious traffic
🔍 How to Verify
Check if Vulnerable:
Check Array AG OS version via web interface (System > About) or CLI command 'show version'. If version is below 9.4.0.499, the system is vulnerable.
Check Version:
show version
Verify Fix Applied:
After patching, verify version is 9.4.0.499 or higher and monitor system logs for service crashes over 24-48 hours.
📡 Detection & Monitoring
Log Indicators:
- Unexpected service process crashes in system logs
- HTTP service restart messages
- Increased error rates in application logs
Network Indicators:
- Unusual HTTP request patterns to Array appliance
- Sudden drops in service availability
- Abnormal HTTP error responses
SIEM Query:
source="array_appliance" AND (event_type="service_crash" OR message="*restart*" OR severity="critical")
🔗 References
- https://semonto.com/tools/website-reachability-check?test=325b4e588e64536b21664d24640f547
- https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Denial_of_Service_ID-144162.pdf
- https://semonto.com/tools/website-reachability-check?test=325b4e588e64536b21664d24640f547
- https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Denial_of_Service_ID-144162.pdf