PatchSiren cyber security CVE debrief
CVE-2025-66644 Array Networks CVE debrief
CVE-2025-66644 is a command injection vulnerability affecting Array Networks ArrayOS AG and is listed in CISA’s Known Exploited Vulnerabilities catalog. That KEV designation means CISA has determined the issue has been exploited in the wild. The supplied corpus does not include a CVSS score or deeper technical detail, so the safest reading is that this is a high-priority exposure for any organization running the product, especially if it is internet-facing or otherwise broadly reachable.
- Vendor
- Array Networks
- Product
- ArrayOS AG
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-12-08
- Original CVE updated
- 2025-12-08
- Advisory published
- 2025-12-08
- Advisory updated
- 2025-12-08
Who should care
Administrators, security teams, and asset owners responsible for Array Networks ArrayOS AG deployments should treat this as urgent. Organizations that rely on the product for perimeter or remote access functions should verify exposure and follow CISA/vendor mitigation guidance immediately.
Technical summary
The available source material identifies CVE-2025-66644 as an OS command injection vulnerability in Array Networks ArrayOS AG. CISA’s KEV record marks it as known exploited and directs organizations to apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. The supplied corpus does not provide exploit mechanics, affected versions, or a CVSS score.
Defensive priority
Highest priority. Because CISA has added the issue to KEV, remediation or compensating controls should be treated as urgent and time-bound.
Recommended defensive actions
- Review the Array Networks vendor guidance referenced by CISA and apply the documented mitigations as soon as possible.
- Confirm whether any ArrayOS AG instances are deployed in your environment, including externally reachable deployments.
- If mitigations are unavailable or cannot be applied quickly, follow CISA’s guidance to discontinue use of the product.
- If the product is used in a cloud-service context, follow applicable BOD 22-01 guidance.
- Validate that security monitoring and alerting cover the affected systems during the remediation window.
Evidence notes
Evidence in the supplied corpus is limited to the CVE record, CISA KEV entry, and official reference links. The KEV entry names Array Networks as the vendor, ArrayOS AG as the product, and identifies the vulnerability as an OS command injection issue with a KEV date added of 2025-12-08 and due date of 2025-12-29. No CVSS score, exploit details, version range, or remediation specifics were provided in the corpus.
Official resources
-
CVE-2025-66644 CVE record
CVE.org
-
CVE-2025-66644 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed through the CVE record and CISA KEV catalog on 2025-12-08. The supplied corpus does not include additional vendor-advisory text, so this debrief is constrained to official catalog and record data only.