First published: Tue Jan 03 2023(Updated: )
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploits could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<6.9.12 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.7 | |
>=6.9.0<6.9.12 | ||
>=6.10.0<6.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the ClearPass Policy Manager web-based management interface is CVE-2022-43538.
The affected versions of ClearPass Policy Manager are between 6.9.0 and 6.9.12, and between 6.10.0 and 6.10.7.
Remote authenticated users can run arbitrary commands on the underlying host.
Successful exploits of this vulnerability could allow an attacker to execute arbitrary commands as root on the underlying operating system, leading to complete system compromise.
The severity of the vulnerability CVE-2022-43538 is rated high with a CVSS score of 7.2.