VPN Vulnerability Fiasco: Hackers Exploit Array Networks, Japan on High Alert!
Hackers are having a field day exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells. Despite a fix, there’s no identifier, making it tricky to track and patch the flaw. Who knew VPN devices could be the life of the security world’s party?

Hot Take:
When life gives you rogue users in your VPN, you make webshell-ade! Seriously though, while Array Networks scrambles to patch a hole that hackers could drive a truck through, their users are left wondering if their VPN is more like a Very Problematic Network. It’s like leaving your front door open and wondering why you have new roommates who keep ordering pizza on your tab. Time to lock the doors, Array!
Key Points:
- Array AG Series VPN devices have been exploited via a command injection vulnerability.
- Hackers have been planting webshells and creating unauthorized users since at least August.
- Array Networks released a fix in May, but tracking the flaw is difficult due to the lack of an identifier.
- Japan’s CERT issued a warning, noting attacks from IP 194.233.100[.]138.
- Updating to ArrayOS version 9.4.5.9 is recommended or use workarounds if updates aren’t possible.
Already a member? Log in here
