First published: Fri Dec 07 2018(Updated: )
A Remote Authentication bypass in Aruba ClearPass Policy Manager leads to complete cluster compromise. An authentication flaw in all versions of ClearPass could allow an attacker to compromise the entire cluster through a specially crafted API call. Network access to the administrative web interface is required to exploit this vulnerability. Resolution: Fixed in 6.7.6 and 6.6.10-hotfix.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | <6.6.10 | |
Aruba ClearPass Policy Manager | >=6.7.0<6.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7067 is considered a critical vulnerability due to its potential to allow complete cluster compromise.
To fix CVE-2018-7067, upgrade all affected versions of Aruba ClearPass Policy Manager to a version higher than 6.7.6.
CVE-2018-7067 affects all versions of Aruba ClearPass Policy Manager up to and including 6.6.10 and versions from 6.7.0 up to 6.7.6.
Yes, CVE-2018-7067 can be exploited remotely through a specially crafted API call.
Exploitation of CVE-2018-7067 allows an attacker to bypass authentication and potentially compromise the entire Aruba ClearPass cluster.