First published: Wed Jun 03 2020(Updated: )
The ClearPass Policy Manager web interface is affected by a vulnerability that leads to authentication bypass. Upon successful bypass an attacker could then execute an exploit that would allow to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.7.0<=6.7.13 | |
Arubanetworks Clearpass Policy Manager | >=6.8.0<6.8.6 | |
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7115 is a vulnerability in the ClearPass Policy Manager web interface that leads to authentication bypass and remote command execution.
CVE-2020-7115 has a severity rating of 9.8 (Critical).
CVE-2020-7115 affects Arubanetworks Clearpass Policy Manager versions 6.7.0 to 6.7.13, versions 6.8.0 to 6.8.6, and versions 6.9.0 to 6.9.1.
CVE-2020-7115 can be fixed by upgrading to version 6.7.13-HF, 6.8.5-HF, or 6.9.2 of the ClearPass Policy Manager.
More information about CVE-2020-7115 can be found at the following references: [Packet Storm Security](http://packetstormsecurity.com/files/158368/ClearPass-Policy-Manager-Unauthenticated-Remote-Command-Execution.html) and [Aruba Networks](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-005.txt).