First published: Wed Nov 19 2014(Updated: )
Aruba Networks ClearPass before 6.3.6 and 6.4.x before 6.4.1 does not properly restrict access to unspecified administrative functions, which allows remote attackers to bypass authentication and execute administrative actions via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks ClearPass | <=6.3.4 | |
Aruba Networks ClearPass | =6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6626 is rated as a high-severity vulnerability due to its potential for allowing unauthorized administrative access.
To fix CVE-2014-6626, upgrade Aruba Networks ClearPass to version 6.3.6 or later, or to 6.4.1 or later.
CVE-2014-6626 affects Aruba Networks ClearPass versions before 6.3.6 and 6.4.0 prior to 6.4.1.
Yes, CVE-2014-6626 can be exploited remotely, allowing attackers to bypass authentication and perform administrative actions.
Organizations using affected versions of Aruba Networks ClearPass are at risk of unauthorized access and potential data compromise due to CVE-2014-6626.