ArrayOS AG VPN Flaw Exploited for Webshell Attacks

ArrayOS AG VPN Flaw Exploited for Webshell Attacks

A critical command injection vulnerability in Array Networksโ€™ ArrayOS AG systems is being actively exploited, with confirmed attacks on Japanese organizations since August 2025.

According to JPCERT/CC, attackers are using this flaw to install webshells and maintain persistent access to enterprise networks, signaling a serious escalation in targeting VPN infrastructure.

About the Vulnerability

The issue exists in the DesktopDirect feature of Array AG series, which allows remote desktop access. This command injection vulnerability lets attackers run arbitrary commands on vulnerable systems without valid credentials.

Although Array Networks released a patched version (9.4.5.9) in May 2025, unpatched systems continue to be exploited, particularly in Japanese enterprises.

Affected Systems

  • ArrayOS AG version 9.4.5.8 and earlier
  • Systems with DesktopDirect enabled

This creates a broad attack surface, as many organizations rely on Array Networks VPNs for critical remote access.

How Attackers Operate

Investigations by JPCERT/CC revealed:

  • Deployment of PHP webshells in /ca/aproxy/webapp/
  • Creation of unauthorized user accounts
  • Internal network reconnaissance using compromised devices

A single source IP (194.233.100.138) was linked to attack traffic, suggesting centralized command and control operations.

Attackers have established fallback access mechanisms to maintain presence even if credentials change or vulnerabilities are patched.

Mitigation Steps

  1. Upgrade immediately to ArrayOS AG 9.4.5.9. Test carefully, as patching requires system reboots and may result in log loss.
  2. Interim measures for organizations unable to patch immediately:
    • Disable DesktopDirect if not needed
    • Block URLs containing semicolon characters, commonly used in command injection attacks
  3. Investigate current systems for compromise:
    • Check for unexpected user accounts
    • Analyze the /ca/aproxy/webapp/ directory for webshell artifacts
    • Review network logs for connections from the malicious IP

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!