First published: Fri Dec 07 2018(Updated: )
An unauthenticated remote command execution exists in Aruba ClearPass Policy Manager on linked devices. The ClearPass OnConnect feature permits administrators to link other network devices into ClearPass for the purpose of collecting enhanced information about connected endpoints. A defect in the API could allow a remote attacker to execute arbitrary commands on one of the linked devices. This vulnerability is only applicable if credentials for devices have been supplied to ClearPass under Configuration -> Network -> Devices -> CLI Settings. Resolution: Fixed in 6.7.5 and 6.6.10-hotfix.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | <6.6.10 | |
Aruba ClearPass Policy Manager | >=6.7.0<6.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7066 is considered a high severity vulnerability due to the potential for unauthenticated remote command execution.
To fix CVE-2018-7066, upgrade Aruba ClearPass Policy Manager to version 6.6.10 or 6.7.5 or later.
CVE-2018-7066 affects Aruba ClearPass Policy Manager versions prior to 6.6.10 and between 6.7.0 and 6.7.5.
Yes, CVE-2018-7066 can be exploited remotely as it allows unauthenticated command execution.
The ClearPass OnConnect feature allows administrators to link network devices to ClearPass, which is related to the vulnerability due to its execution flaw.