First published: Wed Jun 03 2020(Updated: )
The ClearPass Policy Manager WebUI administrative interface has an authenticated command remote execution. When the attacker is already authenticated to the administrative interface, they could then exploit the system, leading to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.7.0<=6.7.13 | |
Aruba ClearPass Policy Manager | >=6.8.0<6.8.6 | |
Aruba ClearPass Policy Manager | >=6.9.0<6.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7116 is classified as a high severity vulnerability due to its ability to enable remote command execution on affected systems.
To fix CVE-2020-7116, upgrade the Aruba ClearPass Policy Manager to a version beyond 6.8.6 or 6.9.1, depending on your current version.
CVE-2020-7116 affects Aruba ClearPass Policy Manager versions from 6.7.0 to 6.7.13 and from 6.8.0 to 6.8.6.
The risks associated with CVE-2020-7116 include potential unauthorized remote access and control of the underlying operating system.
Yes, an attacker must be authenticated to the administrative interface of ClearPass Policy Manager to exploit CVE-2020-7116.