By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
Computing

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

News Room
Last updated: 2025/12/05 at 1:16 AM
News Room Published 5 December 2025
Share
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
SHARE

Dec 05, 2025Ravie LakshmananVulnerability / Network Security

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week.

The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It’s rooted in Array’s DesktopDirect, a remote desktop access solution that allows users to securely access their work computers from any location.

“Exploitation of this vulnerability could allow attackers to execute arbitrary commands,” JPCERT/CC said. “This vulnerability affects systems where the ‘DesktopDirect’ feature, which provides remote desktop access, is enabled.”

The agency said it has confirmed incidents in Japan that have exploited the shortcoming after August 2025 to drop web shells on susceptible devices. The attacks have originated from the IP address “194.233.100[.]138.”

Cybersecurity

There are currently no details available on the scale of the attacks, weaponizing the flaw, and identity of the threat actors exploiting it.

However, an authentication bypass flaw in the same product (CVE-2023-28461, 9.8) was exploited last year by a China-linked cyber espionage group dubbed MirrorFace, which has a history of targeting Japanese organizations since at least 2019. That said, there is no evidence to suggest that at this stage the threat actor could be linked to the latest attack spree.

The vulnerability impacts ArrayOS versions 9.4.5.8 and earlier, and has been addressed in version ArrayOS 9.4.5.9. Users are advised to apply the latest updates as soon as possible to mitigate potential threats. In case patching is not an immediate option, it’s recommended to disable DesktopDirect services and use URL filtering to deny access to URLs containing a semicolon, JPCERT/CC said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article All the biggest news from AWS’ big tech show re:Invent 2025 |  News All the biggest news from AWS’ big tech show re:Invent 2025 | News
Next Article It sure looks like Samsung’s new OLED TVs just leaked before CES It sure looks like Samsung’s new OLED TVs just leaked before CES
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

At the Olympics, It’s Ice Hockey, Skiing, and More Up Today. How to Watch Online
At the Olympics, It’s Ice Hockey, Skiing, and More Up Today. How to Watch Online
News
How to Turn Substack Into a Revenue Machine in 14 Days
How to Turn Substack Into a Revenue Machine in 14 Days
Computing
MWC 2026: What to expect at the world’s largest phone show
MWC 2026: What to expect at the world’s largest phone show
News
TME reports strong subscription growth in Q3, but faces decline in monthly active users · TechNode
TME reports strong subscription growth in Q3, but faces decline in monthly active users · TechNode
Computing

You Might also Like

How to Turn Substack Into a Revenue Machine in 14 Days
Computing

How to Turn Substack Into a Revenue Machine in 14 Days

4 Min Read
TME reports strong subscription growth in Q3, but faces decline in monthly active users · TechNode
Computing

TME reports strong subscription growth in Q3, but faces decline in monthly active users · TechNode

2 Min Read
Tencent’s mobile game Monster Hunter: Outlanders opens pre-registration · TechNode
Computing

Tencent’s mobile game Monster Hunter: Outlanders opens pre-registration · TechNode

1 Min Read
Nissan becomes first global automaker to partner with Huawei on smart cockpit · TechNode
Computing

Nissan becomes first global automaker to partner with Huawei on smart cockpit · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?