🔐 CVE Alert

CVE-2014-125121

UNKNOWN 0.0

Array Networks vAPV and vxAG Default Credential Privilege Escalation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges. Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise.

CWE CWE-798 CWE-732
Vendor array networks
Product vapv
Published Jul 31, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for array networks vapv

Be the first to know when new unknown vulnerabilities affecting array networks vapv are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Array Networks / vAPV
8.3.2.17
Array Networks / vxAG
9.2.0.34

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb packetstorm.news: https://packetstorm.news/files/id/125761 exploit-db.com: https://www.exploit-db.com/exploits/32440 vulncheck.com: https://www.vulncheck.com/advisories/array-networks-vapv-vxag-default-credential-privilege-escalation

Credits

xistence