A command injection vulnerability was discovered in Array Networks APV products. A remote attacker can send a crafted packet after logging into the affected appliance as an administrator, resulting in arbitrary shell code execution. This is fixed in 8.6.1.262 or newer and 10.4.2.93 or newer.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_Command_Injection_Vulnerabilities_APV_ID-133258.pdf - Vendor Advisory |
24 Mar 2023, 14:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:arraynetworks:apv2600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv3600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv1800:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv6600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv1600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv11600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv2600v5:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv6600fips:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv5600:-:*:*:*:*:*:*:* cpe:2.3:o:arraynetworks:array_os:10.4.3.2:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv1600v5:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv800:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv7800:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv5800:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv2800:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:vapv:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv1600t:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv3650:-:*:*:*:*:*:*:* cpe:2.3:o:arraynetworks:array_os:*:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv7600:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv3600v5:-:*:*:*:*:*:*:* cpe:2.3:h:arraynetworks:apv10650:-:*:*:*:*:*:*:* |
|
CWE | CWE-77 | |
First Time |
Arraynetworks apv1600v5
Arraynetworks apv800 Arraynetworks apv5600 Arraynetworks apv3600v5 Arraynetworks array Os Arraynetworks apv1600t Arraynetworks Arraynetworks apv11600 Arraynetworks apv7800 Arraynetworks apv6600 Arraynetworks vapv Arraynetworks apv3600 Arraynetworks apv10650 Arraynetworks apv6600fips Arraynetworks apv5800 Arraynetworks apv2600v5 Arraynetworks apv3650 Arraynetworks apv2600 Arraynetworks apv1600 Arraynetworks apv1800 Arraynetworks apv2800 Arraynetworks apv7600 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
References | (MISC) https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_Command_Injection_Vulnerabilities_APV_ID-133258.pdf - Vendor Advisory |
Information
Published : 2023-03-15 23:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28460
Mitre link : CVE-2023-28460
CVE.ORG link : CVE-2023-28460
JSON object : View
Products Affected
arraynetworks
- apv2600v5
- apv3650
- apv11600
- apv1600v5
- apv800
- apv1800
- apv10650
- vapv
- apv3600
- apv1600t
- apv6600fips
- apv5600
- apv7800
- apv2600
- apv3600v5
- apv6600
- apv7600
- array_os
- apv5800
- apv2800
- apv1600
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')