If you are using Artica Web Proxy on your systems, it is better to check your systems for authentication bypass vulnerability that emerged in fw.login.php page.
Artica Web Proxy is simple-to-use solution, usually the preserve of Large and Multinational companies. Artica Proxy has been developed over the past 10 years as an Open Source Project to help SMEs and public bodies protect both their organizations and employees from Internet danger at a low cost.
In August 2020, researchers discovered a critical vulnerability at Artica Web Proxy in fw.login.php. Artica web proxies with version 4.30.00000000 are affected by this vulnerability. The vulnerability allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php
You can check Artica Web Proxy (CVE-2020-17506) Authentication Bypass vulnerability with our free and online Artica Web Proxy Authentication Bypass Vulnerability Scanner (CVE-2020-17506) tool To do this, you can start by typing your domain name or IP address in the form on top of the page and start scanning.
Or you can find an exploit code written in python programming language on exploit-db.com to check the vulnerability.
There is no update published by the vendor yet. But, you can use ACL (Access Control List) to allow or deny access to the software from untrusted networks.