First published: Tue Feb 27 2024(Updated: )
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<6.10.8 | |
Aruba ClearPass Policy Manager | >=6.11.0<=6.11.6 | |
Aruba ClearPass Policy Manager | =6.9.13 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_4 | |
Aruba ClearPass Policy Manager | =6.10.8 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_6 | |
Aruba ClearPass Policy Manager | =6.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26294 is rated as a critical vulnerability due to its potential to allow remote authenticated users to execute arbitrary commands as root.
To fix CVE-2024-26294, update your Aruba ClearPass Policy Manager to the latest version or apply the necessary patches recommended by Aruba Networks.
CVE-2024-26294 affects users of Aruba ClearPass Policy Manager versions 6.9.0 to 6.9.13, 6.10.0 to 6.10.8, and 6.11.0 to 6.11.6.
Exploitation of CVE-2024-26294 could allow an attacker to execute arbitrary commands on the underlying operating system, leading to full system compromise.
CVE-2024-26294 was published in 2024, detailing vulnerabilities that allow unauthorized command execution through the ClearPass Policy Manager.