Cybersecurity Alert: Chinese Hackers Exploit Critical Flaw in Array Networks – Patch Now!
CISA adds Array AG/vxAG remote code execution vulnerability to its Known Exploited Vulnerabilities catalog. This critical flaw, with a CVSS score of 9.8, allows remote code execution due to missing authentication. Earth Kasha cyber espionage group is actively exploiting it, prompting urgent patching by December 2024 to secure networks.

Hot Take:
It seems that the saga of cybersecurity vulnerabilities is never-ending. Just when you thought it was safe to go back online, CISA drops another bombshell: a critical flaw in Array Networks that lets hackers treat your network like their personal playground. But hey, what’s a little arbitrary code execution between friends?
Key Points:
- CISA adds CVE-2023-28461 to its Known Exploited Vulnerabilities catalog.
- The flaw allows remote code execution on Array Networks AG and vxAG secure access gateways.
- Affected systems should be patched by December 16, 2024, as per CISA’s recommendation.
- Earth Kasha, a China-linked group, exploits this flaw among others for cyber espionage.
- Over 440,000 internet-exposed hosts are susceptible to such vulnerabilities, according to VulnCheck.
Already a member? Log in here
