First published: Tue Jan 03 2023(Updated: )
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
>=6.9.0<6.9.12 | ||
>=6.10.0<6.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43532 is a vulnerability in the web-based management interface of ClearPass Policy Manager that allows an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user.
CVE-2022-43532 affects versions of ClearPass Policy Manager between 6.9.0 and 6.9.12, as well as versions between 6.10.0 and 6.10.7.
CVE-2022-43532 has a severity rating of 4.8 (High).
An attacker can exploit CVE-2022-43532 by executing arbitrary script code through a stored cross-site scripting (XSS) attack on an administrative user of the ClearPass Policy Manager interface.
Yes, users of affected versions should update ClearPass Policy Manager to a version that is not vulnerable or apply the necessary patches provided by Arubanetworks.