First published: Tue Jan 03 2023(Updated: )
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploits could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
>=6.9.0<6.9.12 | ||
>=6.10.0<6.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43536.
The severity of CVE-2022-43536 is high (8.8).
Remote authenticated users can exploit CVE-2022-43536 by running arbitrary commands on the underlying host.
ClearPass Policy Manager versions 6.9.0 to 6.9.12 and 6.10.0 to 6.10.7 are affected.
Yes, a fix is available for CVE-2022-43536. It is recommended to update to a version that is not affected.