Loading
Generated remediation guidance and an executive summary. No account required.
Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon."
Use CWE-287, Arraynetworks vendor hub and Arrayos Ag product page to widen CVE-2023-28461 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-66644, CVE-2023-51707 and CVE-2022-42897 for nearby disclosures in the same product family.