First published: Tue Feb 27 2024(Updated: )
A vulnerability in the guest interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba ClearPass Policy Manager | >=6.9.0<6.9.13 | |
Aruba ClearPass Policy Manager | >=6.10.0<6.10.8 | |
Aruba ClearPass Policy Manager | >=6.11.0<=6.11.6 | |
Aruba ClearPass Policy Manager | =6.9.13 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Aruba ClearPass Policy Manager | =6.9.13-cumulative_hotfix_patch_4 | |
Aruba ClearPass Policy Manager | =6.10.8 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 | |
Aruba ClearPass Policy Manager | =6.10.8-cumulative_hotfix_patch_6 | |
Aruba ClearPass Policy Manager | =6.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26300 is considered a medium severity vulnerability due to its potential for exploitation through stored cross-site scripting.
To fix CVE-2024-26300, apply the latest patches from Aruba Networks for affected versions of ClearPass Policy Manager.
CVE-2024-26300 affects authenticated users of ClearPass Policy Manager versions 6.9.0 through 6.9.13, 6.10.0 through 6.10.8, and 6.11.0 through 6.11.6.
CVE-2024-26300 can be exploited to conduct a stored cross-site scripting (XSS) attack against administrative users.
The impact of CVE-2024-26300 includes the potential execution of arbitrary script code in the context of an administrative user.