First published: Tue Feb 27 2024(Updated: )
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<6.10.8 | |
Aruba ClearPass Policy Manager | >=6.11.0<=6.11.6 | |
Aruba ClearPass Policy Manager | =6.9.13 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_4 | |
Aruba ClearPass Policy Manager | =6.10.8 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_6 | |
Aruba ClearPass Policy Manager | =6.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26297 is considered a critical vulnerability as it allows remote authenticated users to execute arbitrary commands as root on the underlying host.
To fix CVE-2024-26297, it is recommended to update Aruba ClearPass Policy Manager to the latest version available that addresses this vulnerability.
Any organization using affected versions of Aruba ClearPass Policy Manager from versions 6.9.0 to 6.12.0 may be vulnerable to CVE-2024-26297.
Yes, CVE-2024-26297 can be exploited remotely by authenticated users who have access to the web-based management interface.
The potential impacts of CVE-2024-26297 include unauthorized command execution and complete compromise of the underlying operating system.