First published: Tue Mar 14 2023(Updated: )
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an unauthenticated remote attacker to create arbitrary users on the platform. A successful exploit allows an attacker to achieve total cluster compromise.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | >=6.9.0<=6.9.13 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<=6.10.8 | |
Arubanetworks Clearpass Policy Manager | =6.11.0 | |
Arubanetworks Clearpass Policy Manager | =6.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25589 is a vulnerability in the web-based management interface of ClearPass Policy Manager that allows an attacker to create arbitrary users on the platform.
ClearPass Policy Manager versions 6.9.0 to 6.9.13, 6.10.0 to 6.10.8, 6.11.0, and 6.11.1 are affected by CVE-2023-25589.
CVE-2023-25589 has a severity rating of 9.8 (Critical).
An unauthenticated remote attacker can exploit CVE-2023-25589 to create arbitrary users on the ClearPass Policy Manager platform, potentially leading to total cluster compromise.
Yes, you can find more information about CVE-2023-25589 at the following link: [Aruba Networks PSA](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt).