First published: Tue Feb 23 2021(Updated: )
A remote authenticated SQL Injection vulnerabilitiy was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface API of ClearPass could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | <=6.7.14 | |
Aruba ClearPass Policy Manager | >=6.8.0<=6.8.8 | |
Aruba ClearPass Policy Manager | >=6.9.0<6.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26685 has a medium severity rating due to the potential for SQL injection attacks by authenticated users.
To fix CVE-2021-26685, upgrade Aruba ClearPass Policy Manager to versions 6.9.5, 6.8.8-HF1, or 6.7.14-HF1 or later.
CVE-2021-26685 affects users of Aruba ClearPass Policy Manager versions prior to 6.9.5, 6.8.8-HF1, and 6.7.14-HF1.
Systems running Aruba ClearPass Policy Manager versions older than 6.9.5, 6.8.8-HF1, or 6.7.14-HF1 are vulnerable to CVE-2021-26685.
Yes, CVE-2021-26685 can be exploited remotely by authenticated attackers through the web-based management interface API.