First published: Tue Jan 03 2023(Updated: )
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploits could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
>=6.9.0<6.9.12 | ||
>=6.10.0<6.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-43537 is high with a severity value of 7.2.
CVE-2022-43537 affects Arubanetworks Clearpass Policy Manager versions between 6.9.0 and 6.9.12, as well as versions between 6.10.0 and 6.10.7.
If successfully exploited, an attacker can execute arbitrary commands as root on the underlying operating system, leading to complete system compromise.
To fix CVE-2022-43537, it is recommended to upgrade Arubanetworks Clearpass Policy Manager to a version that is not affected by the vulnerability.
You can find more information about CVE-2022-43537 in the advisory published by Aruba Networks at the following URL: [https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt]