First published: Tue Oct 01 2013(Updated: )
The Sponsorship Confirmation functionality in Aruba Networks ClearPass 5.x, 6.0.1, and 6.0.2, and Amigopod/ClearPass Guest 3.0 through 3.9.7, allows remote attackers to bypass intended access restrictions and approve a request by sending a guest request, then using "parameter manipulation" in conjunction with information from a "default holding page" to discover the link that is used for sponsor approval of the guest request, then performing a direct request to that link.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks ClearPass | =5.0.1 | |
Aruba Networks ClearPass | =5.1 | |
Aruba Networks ClearPass | =5.2 | |
Aruba Networks ClearPass | =6.0.1 | |
Aruba Networks ClearPass | =6.0.2 | |
Aruba Networks ClearPass Guest | =3.0 | |
Aruba Networks ClearPass Guest | =3.1 | |
Aruba Networks ClearPass Guest | =3.2 | |
Aruba Networks ClearPass Guest | =3.3 | |
Aruba Networks ClearPass Guest | =3.5 | |
Aruba Networks ClearPass Guest | =3.7 | |
Aruba Networks ClearPass Guest | =3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2269 has a Common Vulnerability Scoring System (CVSS) score that reflects a medium to high severity due to the potential for unauthorized access.
To mitigate CVE-2013-2269, update to the latest version of Aruba Networks ClearPass or ClearPass Guest as per the vendor's guidance.
CVE-2013-2269 affects Aruba Networks ClearPass versions 5.x, 6.0.1, 6.0.2, and ClearPass Guest versions 3.0 through 3.9.7.
CVE-2013-2269 is a security vulnerability that allows remote attackers to bypass access restrictions through parameter manipulation.
If exploited, CVE-2013-2269 could allow attackers to approve guest requests, leading to unauthorized access to network resources.