First published: Tue Mar 14 2023(Updated: )
Vulnerabilities within the web-based management interface of ClearPass Policy Manager could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<=6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<=6.10.8 | |
Aruba ClearPass Policy Manager | =6.11.0 | |
Aruba ClearPass Policy Manager | =6.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25592 refers to vulnerabilities within the web-based management interface of ClearPass Policy Manager that could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack.
CVE-2023-25592 allows an attacker to execute arbitrary script code in a victim's browser, potentially compromising their data and privacy.
ClearPass Policy Manager versions 6.9.0 to 6.9.13, 6.10.0 to 6.10.8, 6.11.0, and 6.11.1 are affected by CVE-2023-25592.
CVE-2023-25592 has a severity level of 6.1, which is classified as high.
Users can mitigate the risk of CVE-2023-25592 by updating ClearPass Policy Manager to a version that is not affected by the vulnerability, as recommended by the vendor.