First published: Fri Dec 07 2018(Updated: )
Aruba ClearPass Policy Manager guest authorization failure. Certain administrative operations in ClearPass Guest do not properly enforce authorization rules, which allows any authenticated administrative user to execute those operations regardless of privilege level. This could allow low-privilege users to view, modify, or delete guest users. Resolution: Fixed in 6.7.6 and 6.6.10-hotfix.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | <6.6.10 | |
Aruba ClearPass Policy Manager | >=6.7.0<6.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7079 is classified as a medium severity vulnerability due to improper authorization enforcement that can be exploited by low-privilege users.
To fix CVE-2018-7079, upgrade Aruba ClearPass Policy Manager to version 6.7.6 or later to address the guest authorization failure.
CVE-2018-7079 affects Aruba ClearPass Policy Manager versions prior to 6.7.0 and between 6.7.0 and 6.7.6.
If exploited, CVE-2018-7079 allows authenticated low-privilege users to perform administrative operations beyond their authorization level.
There is no public indication that CVE-2018-7079 is currently being actively exploited, but it poses a risk if left unpatched.