Generated remediation guidance and an executive summary. No account required.
The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481.
Use CWE-787, Arraynetworks vendor hub and Arrayos Ag product page to widen CVE-2023-24613 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-28461, CVE-2025-66644 and CVE-2023-51707 for nearby disclosures in the same product family.