By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Computing

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

News Room
Last updated: 2025/12/05 at 1:16 AM
News Room Published 5 December 2025
Share
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
SHARE

Dec 05, 2025Ravie LakshmananVulnerability / Network Security

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week.

The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It’s rooted in Array’s DesktopDirect, a remote desktop access solution that allows users to securely access their work computers from any location.

“Exploitation of this vulnerability could allow attackers to execute arbitrary commands,” JPCERT/CC said. “This vulnerability affects systems where the ‘DesktopDirect’ feature, which provides remote desktop access, is enabled.”

The agency said it has confirmed incidents in Japan that have exploited the shortcoming after August 2025 to drop web shells on susceptible devices. The attacks have originated from the IP address “194.233.100[.]138.”

Cybersecurity

There are currently no details available on the scale of the attacks, weaponizing the flaw, and identity of the threat actors exploiting it.

However, an authentication bypass flaw in the same product (CVE-2023-28461, 9.8) was exploited last year by a China-linked cyber espionage group dubbed MirrorFace, which has a history of targeting Japanese organizations since at least 2019. That said, there is no evidence to suggest that at this stage the threat actor could be linked to the latest attack spree.

The vulnerability impacts ArrayOS versions 9.4.5.8 and earlier, and has been addressed in version ArrayOS 9.4.5.9. Users are advised to apply the latest updates as soon as possible to mitigate potential threats. In case patching is not an immediate option, it’s recommended to disable DesktopDirect services and use URL filtering to deny access to URLs containing a semicolon, JPCERT/CC said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article All the biggest news from AWS’ big tech show re:Invent 2025 |  News All the biggest news from AWS’ big tech show re:Invent 2025 | News
Next Article It sure looks like Samsung’s new OLED TVs just leaked before CES It sure looks like Samsung’s new OLED TVs just leaked before CES
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

This weekend Amazon has the DKI Mini 4K drone for 20% off
This weekend Amazon has the DKI Mini 4K drone for 20% off
News
Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? | HackerNoon
Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? | HackerNoon
Computing
Why There’s Simply No Need For Dual Graphics Cards Anymore – BGR
Why There’s Simply No Need For Dual Graphics Cards Anymore – BGR
News
CATL seeks to manufacture batteries in the US pending Trump’s approval · TechNode
CATL seeks to manufacture batteries in the US pending Trump’s approval · TechNode
Computing

You Might also Like

Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? | HackerNoon
Computing

Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? | HackerNoon

7 Min Read
CATL seeks to manufacture batteries in the US pending Trump’s approval · TechNode
Computing

CATL seeks to manufacture batteries in the US pending Trump’s approval · TechNode

1 Min Read
Etsy Boards That Rank on Pinterest
Computing

Etsy Boards That Rank on Pinterest

3 Min Read
Looking Back at the Changes That Rust 1.77.1 Brought In | HackerNoon
Computing

Looking Back at the Changes That Rust 1.77.1 Brought In | HackerNoon

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?