First published: Tue Oct 24 2023(Updated: )
A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a non-privileged user on the underlying operating system leading to partial system compromise.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | <6.9.13 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.8 | |
Arubanetworks Clearpass Policy Manager | >=6.11.0<=6.11.4 | |
Arubanetworks Clearpass Policy Manager | =6.9.13 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Arubanetworks Clearpass Policy Manager | =6.10.8 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43510 is a vulnerability in the ClearPass Policy Manager web-based management interface that allows remote authenticated users to run arbitrary commands on the underlying host.
The ClearPass Policy Manager software versions 6.9.13, 6.10.0 to 6.10.8, and 6.11.0 to 6.11.4 are affected by CVE-2023-43510.
The severity of CVE-2023-43510 is medium with a CVSS score of 6.3.
An attacker with remote authenticated access can exploit CVE-2023-43510 to execute arbitrary commands on the underlying operating system.
Yes, updating the ClearPass Policy Manager software to a version that is not affected by CVE-2023-43510 will fix the vulnerability.