Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges.
Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Arraynetworks
Arraynetworks vapv Arraynetworks vxag |
|
Vendors & Products |
Arraynetworks
Arraynetworks vapv Arraynetworks vxag |
Thu, 31 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges. Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise. | |
Title | Array Networks vAPV and vxAG Default Credential Privilege Escalation | |
Weaknesses | CWE-732 CWE-798 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-31T14:52:45.290Z
Updated: 2025-07-31T15:17:56.760Z
Reserved: 2025-07-30T14:40:43.661Z
Link: CVE-2014-125121

Updated: 2025-07-31T15:17:52.464Z

Status : Awaiting Analysis
Published: 2025-07-31T15:15:34.470
Modified: 2025-07-31T18:42:37.870
Link: CVE-2014-125121

No data.