Cybersecurity Alert: Chinese Hackers Exploit Critical Flaw in Array Networks – Patch Now!

CISA adds Array AG/vxAG remote code execution vulnerability to its Known Exploited Vulnerabilities catalog. This critical flaw, with a CVSS score of 9.8, allows remote code execution due to missing authentication. Earth Kasha cyber espionage group is actively exploiting it, prompting urgent patching by December 2024 to secure networks.

Pro Dashboard

Hot Take:

It seems that the saga of cybersecurity vulnerabilities is never-ending. Just when you thought it was safe to go back online, CISA drops another bombshell: a critical flaw in Array Networks that lets hackers treat your network like their personal playground. But hey, what’s a little arbitrary code execution between friends?

Key Points:

  • CISA adds CVE-2023-28461 to its Known Exploited Vulnerabilities catalog.
  • The flaw allows remote code execution on Array Networks AG and vxAG secure access gateways.
  • Affected systems should be patched by December 16, 2024, as per CISA’s recommendation.
  • Earth Kasha, a China-linked group, exploits this flaw among others for cyber espionage.
  • Over 440,000 internet-exposed hosts are susceptible to such vulnerabilities, according to VulnCheck.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?