First published: Tue Sep 20 2022(Updated: )
A vulnerability in the ClearPass Policy Manager web-based management interface exists which exposes some endpoints to a lack of Cross-Site Request Forgery (CSRF) protection. This could allow a remote unauthenticated attacker to execute arbitrary input against these endpoints if the attacker can convince an authenticated user of the interface to interact with a specially crafted URL in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<6.9.12 | |
Aruba ClearPass Policy Manager | >=6.10.0<6.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-23685 is high.
Arubanetworks Clearpass Policy Manager versions 6.9.0 to 6.9.12 and versions 6.10.0 to 6.10.7 are affected by CVE-2022-23685.
CVE-2022-23685 exposes some endpoints in the ClearPass Policy Manager web-based management interface to a lack of Cross-Site Request Forgery (CSRF) protection.
CVE-2022-23685 could allow a remote unauthenticated attacker to execute arbitrary input against the affected endpoints.
Yes, Arubanetworks has provided a fix for CVE-2022-23685. Please refer to the vendor's advisory for more information.