First published: Tue Mar 14 2023(Updated: )
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<=6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<=6.10.8 | |
Aruba ClearPass Policy Manager | =6.11.0 | |
Aruba ClearPass Policy Manager | =6.11.1 | |
Linux kernel | ||
All of | ||
Any of | ||
Aruba ClearPass Policy Manager | >=6.9.0<=6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<=6.10.8 | |
Aruba ClearPass Policy Manager | =6.11.0 | |
Aruba ClearPass Policy Manager | =6.11.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25590 is a vulnerability in the ClearPass OnGuard Linux agent that allows malicious users on a Linux instance to elevate their user privileges and execute arbitrary code with root level privileges.
Arubanetworks Clearpass Policy Manager versions 6.9.0 to 6.9.13, 6.10.0 to 6.10.8, 6.11.0, and 6.11.1 are affected by CVE-2023-25590.
CVE-2023-25590 has a severity score of 7.8, which is considered high.
Apply the necessary patches and updates provided by Arubanetworks to fix CVE-2023-25590.
You can find more information about CVE-2023-25590 in the advisory published by Arubanetworks at the following link: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt