VPN Vulnerability Fiasco: Hackers Exploit Array Networks, Japan on High Alert!

Hackers are having a field day exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells. Despite a fix, there’s no identifier, making it tricky to track and patch the flaw. Who knew VPN devices could be the life of the security world’s party?

Pro Dashboard

Hot Take:

When life gives you rogue users in your VPN, you make webshell-ade! Seriously though, while Array Networks scrambles to patch a hole that hackers could drive a truck through, their users are left wondering if their VPN is more like a Very Problematic Network. It’s like leaving your front door open and wondering why you have new roommates who keep ordering pizza on your tab. Time to lock the doors, Array!

Key Points:

  • Array AG Series VPN devices have been exploited via a command injection vulnerability.
  • Hackers have been planting webshells and creating unauthorized users since at least August.
  • Array Networks released a fix in May, but tracking the flaw is difficult due to the lack of an identifier.
  • Japan’s CERT issued a warning, noting attacks from IP 194.233.100[.]138.
  • Updating to ArrayOS version 9.4.5.9 is recommended or use workarounds if updates aren’t possible.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?