Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

Posted on December 5, 2025December 5, 2025 By CWS

Dec 05, 2025Ravie LakshmananVulnerability / Community Safety
A command injection vulnerability in Array Networks AG Collection safe entry gateways has been exploited within the wild since August 2025, in keeping with an alert issued by JPCERT/CC this week.
The vulnerability, which doesn’t have a CVE identifier, was addressed by the corporate on Could 11, 2025. It is rooted in Array’s DesktopDirect, a distant desktop entry resolution that permits customers to securely entry their work computer systems from any location.
“Exploitation of this vulnerability may permit attackers to execute arbitrary instructions,” JPCERT/CC mentioned. “This vulnerability impacts methods the place the ‘DesktopDirect’ characteristic, which gives distant desktop entry, is enabled.”
The company mentioned it has confirmed incidents in Japan which have exploited the shortcoming after August 2025 to drop net shells on prone gadgets. The assaults have originated from the IP handle “194.233.100[.]138.”

There are at present no particulars accessible on the dimensions of the assaults, weaponizing the flaw, and identification of the menace actors exploiting it.
Nevertheless, an authentication bypass flaw in the identical product (CVE-2023-28461, 9.8) was exploited final yr by a China-linked cyber espionage group dubbed MirrorFace, which has a historical past of focusing on Japanese organizations since no less than 2019. That mentioned, there isn’t a proof to counsel that at this stage the menace actor may very well be linked to the newest assault spree.
The vulnerability impacts ArrayOS variations 9.4.5.8 and earlier, and has been addressed in model ArrayOS 9.4.5.9. Customers are suggested to use the newest updates as quickly as doable to mitigate potential threats. In case patching will not be a direct possibility, it is really useful to disable DesktopDirect providers and use URL filtering to disclaim entry to URLs containing a semicolon, JPCERT/CC mentioned.

The Hacker News Tags:Active, Array, Attacks, Command, Confirms, Gateways, Injection, JPCERT

Post navigation

Previous Post: New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer
Next Post: Chinese Hackers Exploiting React2Shell Vulnerability

Related Posts

Open Source Web Application Firewall with Zero-Day Detection and Bot Protection The Hacker News
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The Hacker News
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems The Hacker News
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security The Hacker News
Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark