First published: Tue Oct 24 2023(Updated: )
Vulnerabilities in the web-based management interface of ClearPass Policy Manager allow an attacker with read-only privileges to perform actions that change the state of the ClearPass Policy Manager instance. Successful exploitation of these vulnerabilities allow an attacker to complete state-changing actions in the web-based management interface that should not be allowed by their current level of authorization on the platform.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | <6.9.13 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.8 | |
Arubanetworks Clearpass Policy Manager | >=6.11.0<=6.11.4 | |
Arubanetworks Clearpass Policy Manager | =6.9.13 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Arubanetworks Clearpass Policy Manager | =6.10.8 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43508 is medium with a severity value of 6.3.
ClearPass Policy Manager version 6.9.13 up to 6.11.4 is affected by CVE-2023-43508.
An attacker with read-only privileges can exploit CVE-2023-43508 to perform actions that change the state of the ClearPass Policy Manager instance.
To fix CVE-2023-43508, it is recommended to upgrade the ClearPass Policy Manager instance to a version that is not affected.
Yes, you can find more information about CVE-2023-43508 at the following link: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt