Urgent: Command Injection Flaw Actively Exploited in Array AG Gateways

Published:

spot_img

Security Alert: Command Injection Vulnerability in Array Networks AG Series

Overview of the Vulnerability

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has issued a critical advisory regarding a command injection vulnerability in the Array Networks AG Series secure access gateways. This flaw has been actively exploited in Japan since August 2025, allowing attackers to breach internal networks by deploying web shells. The advisory was revised on December 5, 2025, highlighting the ongoing severity of the situation.

Understanding the Flaw

The vulnerability is rooted in the DesktopDirect feature of the AG Series. This remote desktop access tool was intended to facilitate secure connections for users accessing their office resources. Although Array Networks addressed the issue quietly on May 11, 2025, the absence of a publicly available CVE identifier and the number of unpatched devices have left a large vulnerability surface for potential attackers.

According to JPCERT, “Exploitation of this vulnerability could allow attackers to execute arbitrary commands.” Notably, systems utilizing the DesktopDirect feature are particularly vulnerable, and having this feature enabled is essential for successful exploitation.

Attack Patterns and Origins

JPCERT documented that since August 2025, several organizations in Japan have faced intrusions tied to this critical security gap. Attackers have used techniques such as embedding PHP-based web shells in specific paths like “/webapp/”, facilitating persistent remote access.

Interestingly, all malicious traffic has been traced back to a single IP address: 194.233.100[.]138. However, the identity and agenda of the threat actors behind this activity remain unknown, with further details on their tools and methodologies yet to be disclosed.

No Connection to Previous Vulnerabilities

This newly identified command injection vulnerability operates independently of a previously exploited issue in the same product line, which is identified as CVE-2023-28461. Rated with a high-severity score of CVSS 9.8, the earlier vulnerability was exploited in 2024 by the cyber-espionage group known as MirrorFace, which has a history of targeting Japanese institutions.

While both vulnerabilities affect similar systems, JPCERT has stressed that there is currently no evidence linking the command injection attacks to MirrorFace or any activity connected to CVE-2023-28461.

Affected Versions and Updates Required

The command injection vulnerability impacts all versions of ArrayOS prior to 9.4.5.9, particularly those that support the DesktopDirect feature. Array Networks has released an updated firmware version, ArrayOS 9.4.5.9, designed to rectify this security flaw. Users are strongly encouraged to update their systems promptly to mitigate risks.

JPCERT also cautioned administrators that rebooting the devices after applying this patch could lead to the loss of crucial log files, which are vital for investigating potential intrusions. Therefore, preserving these logs prior to system updates or reboots is recommended.

For organizations that are unable to implement the firmware update immediately, Array Networks recommends temporary mitigation strategies:

  • Disable DesktopDirect Services: If the DesktopDirect feature is not actively being used, it should be disabled to reduce vulnerability exposure.

  • Implement URL Filtering: Organizations should consider implementing URL filtering to block requests containing semicolons (“;”), which are commonly used in command injection techniques.

These precautionary measures serve to help minimize exposure until a timely patch can be applied.

In light of these developments, JPCERT has urged all users of affected Array Networks products to closely monitor their systems for any signs of compromise. Reported malicious activities linked to this vulnerability include the installation of web shells, creation of unauthorized user accounts, and additional internal intrusions initiated via the compromised AG gateways. As security threats evolve, staying informed and proactive becomes essential in safeguarding sensitive information.

spot_img

Related articles

Recent articles

Qatar Executive to Outfit Private Jet Fleet with Starlink Ultra-Fast Internet by 2026

Qatar Executive to Upgrade Private Jet Fleet with Starlink Internet Major Leap in Private Aviation Connectivity Qatar Executive, the private jet charter arm of Qatar Airways...

ED Seizes ₹1,120 Crore in Reliance Home Finance Case Over Alleged Fund Diversion

Major Enforcement Action Against Reliance Anil Dhirubhai Ambani Group Enforcement Directorate Steps In The Enforcement Directorate (ED) has intensified its efforts in addressing alleged financial irregularities...

Black Hat MEA: Unveiling Its Largest Edition to Date

Black Hat MEA 2023: A Transformative Gathering for Cybersecurity The bustling city of Riyadh stood as a beacon for the global cybersecurity community as Black...

Lee County Man Arrested for Dark Web Drug Purchases Following Package Discovery

Lee County Man Arrested for Dark Web Drug Purchases Discovery of a Drug-Filled Package In a significant operation, Lee County deputies apprehended a man after he...