Remote Code Execution Vulnerability in ClearPass Policy Manager Could Lead to Complete System Compromise
CVE-2024-26297

7.2HIGH

Key Information:

Vendor
HP
Vendor
CVE Published:
27 February 2024

Summary

The vulnerability allows remote authenticated users to exploit the ClearPass Policy Manager's web-based management interface, enabling them to execute arbitrary commands on the underlying host. This serious flaw provides an opportunity for attackers to execute commands with root privileges, potentially leading to full system takeover. Organizations using affected versions of ClearPass Policy Manager are urged to update to secure their systems against this critical exploitation vector.

Affected Version(s)

Aruba ClearPass Policy Manager ClearPass Policy Manager 6.12.x: 6.12.0

Aruba ClearPass Policy Manager ClearPass Policy Manager 6.12.x: 6.12.0

Aruba ClearPass Policy Manager ClearPass Policy Manager 6.11.x: 6.11.6 and below

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kajetan Rostojek (@kaje11)
.