First published: Tue Jan 03 2023(Updated: )
A vulnerability in the ClearPass OnGuard macOS agent could allow malicious users on a macOS instance to elevate their user privileges. A successful exploit could allow these users to execute arbitrary code with root level privileges on the macOS instance in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
Apple macOS | ||
All of | ||
Any of | ||
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43533.
The severity of CVE-2022-43533 is high with a CVSS score of 7.8.
The affected software is Aruba ClearPass Policy Manager versions 6.9.0 to 6.9.12 and versions 6.10.0 to 6.10.7.
A successful exploit of CVE-2022-43533 could allow malicious users on a macOS instance to elevate their user privileges and execute arbitrary code with root level privileges.
To fix CVE-2022-43533, it is recommended to update to a patched version provided by Aruba Networks as soon as it becomes available.