By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Computing

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

News Room
Last updated: 2025/12/05 at 1:16 AM
News Room Published 5 December 2025
Share
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
SHARE

Dec 05, 2025Ravie LakshmananVulnerability / Network Security

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week.

The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It’s rooted in Array’s DesktopDirect, a remote desktop access solution that allows users to securely access their work computers from any location.

“Exploitation of this vulnerability could allow attackers to execute arbitrary commands,” JPCERT/CC said. “This vulnerability affects systems where the ‘DesktopDirect’ feature, which provides remote desktop access, is enabled.”

The agency said it has confirmed incidents in Japan that have exploited the shortcoming after August 2025 to drop web shells on susceptible devices. The attacks have originated from the IP address “194.233.100[.]138.”

Cybersecurity

There are currently no details available on the scale of the attacks, weaponizing the flaw, and identity of the threat actors exploiting it.

However, an authentication bypass flaw in the same product (CVE-2023-28461, 9.8) was exploited last year by a China-linked cyber espionage group dubbed MirrorFace, which has a history of targeting Japanese organizations since at least 2019. That said, there is no evidence to suggest that at this stage the threat actor could be linked to the latest attack spree.

The vulnerability impacts ArrayOS versions 9.4.5.8 and earlier, and has been addressed in version ArrayOS 9.4.5.9. Users are advised to apply the latest updates as soon as possible to mitigate potential threats. In case patching is not an immediate option, it’s recommended to disable DesktopDirect services and use URL filtering to deny access to URLs containing a semicolon, JPCERT/CC said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article All the biggest news from AWS’ big tech show re:Invent 2025 |  News All the biggest news from AWS’ big tech show re:Invent 2025 | News
Next Article It sure looks like Samsung’s new OLED TVs just leaked before CES It sure looks like Samsung’s new OLED TVs just leaked before CES
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Insta360-co-incubated Antigravity launches A1, a 249g 8K 360 drone with headset-based control · TechNode
Insta360-co-incubated Antigravity launches A1, a 249g 8K 360 drone with headset-based control · TechNode
Computing
‘Scam adverts’ are appearing on YouTube – experts say it will only get worse
‘Scam adverts’ are appearing on YouTube – experts say it will only get worse
News
Today's NYT Connections Hints, Answers for Dec. 5 #908
Today's NYT Connections Hints, Answers for Dec. 5 #908
News
EXCLUSIVE: UK and Germany sign £14m quantum deal – UKTN
EXCLUSIVE: UK and Germany sign £14m quantum deal – UKTN
News

You Might also Like

Insta360-co-incubated Antigravity launches A1, a 249g 8K 360 drone with headset-based control · TechNode
Computing

Insta360-co-incubated Antigravity launches A1, a 249g 8K 360 drone with headset-based control · TechNode

2 Min Read
👨🏿‍🚀 Daily – A bigger slice of the Safari |
Computing

👨🏿‍🚀 Daily – A bigger slice of the Safari |

14 Min Read
Quick Fire 🔥 with Lotachi Anidi |
Computing

Quick Fire 🔥 with Lotachi Anidi |

11 Min Read
Linux 6.19 GPU Driver Features: Color Pipeline API, Intel Xe3P, AMDGPU For GCN 1.0/1.1
Computing

Linux 6.19 GPU Driver Features: Color Pipeline API, Intel Xe3P, AMDGPU For GCN 1.0/1.1

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?