Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-0502
Vulnerability from csaf_certbund
Published
2024-02-27 23:00
Modified
2024-06-05 22:00
Summary
Aruba ClearPass Policy Manager: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Aruba ClearPass ist eine Netzwerk-Zugangskontrolllösung.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Aruba ClearPass Policy Manager ausnutzen, um beliebigen Code im Kontext des Dienstes auszuführen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuführen.
Betroffene Betriebssysteme
- Android
- iPhoneOS
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Aruba ClearPass ist eine Netzwerk-Zugangskontrolll\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Aruba ClearPass Policy Manager ausnutzen, um beliebigen Code im Kontext des Dienstes auszuf\u00fchren, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Android\n- iPhoneOS\n- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0502 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0502.json" }, { "category": "self", "summary": "WID-SEC-2024-0502 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0502" }, { "category": "external", "summary": "HPE Aruba Networking Product Security Advisory vom 2024-02-27", "url": "https://www.arubanetworks.com/security-advisory/clearpass-policy-manager-multiple-vulnerabilities-20/" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-57f3-xqmx-39gv" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-763w-c5w6-4pw8" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-8hf3-685j-g9xf" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-gh72-4xjj-7p87" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-j6mw-3p6q-wxcc" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-jhxw-wgr6-6rqc" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-jxq3-2hwh-v5qg" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-p52j-p77c-rqf9" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-27", "url": "https://github.com/advisories/GHSA-q5ch-6whv-v4gp" }, { "category": "external", "summary": "HPE Product Security Advisory", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04601en_us\u0026docLocale=en_US" } ], "source_lang": "en-US", "title": "Aruba ClearPass Policy Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:05:50.130+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0502", "initial_release_date": "2024-02-27T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-27T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Aruba ClearPass Policy Manager", "product": { "name": "Aruba ClearPass Policy Manager", "product_id": "T023403", "product_identification_helper": { "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-" } } }, { "category": "product_version_range", "name": "\u003c6.12.1", "product": { "name": "Aruba ClearPass Policy Manager \u003c6.12.1", "product_id": "T033116" } }, { "category": "product_version_range", "name": "\u003c6.11.7", "product": { "name": "Aruba ClearPass Policy Manager \u003c6.11.7", "product_id": "T033117" } }, { "category": "product_version_range", "name": "\u003c6.10.8 Hotfix Patch 8 Q1 2024", "product": { "name": "Aruba ClearPass Policy Manager \u003c6.10.8 Hotfix Patch 8 Q1 2024", "product_id": "T033119" } }, { "category": "product_version_range", "name": "\u003c6.9.13 Hotfix Patch 7 Q1 2024", "product": { "name": "Aruba ClearPass Policy Manager \u003c6.9.13 Hotfix Patch 7 Q1 2024", "product_id": "T033120" } } ], "category": "product_name", "name": "ClearPass Policy Manager" } ], "category": "vendor", "name": "Aruba" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-26294", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, privilegiert Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26294" }, { "cve": "CVE-2024-26295", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, privilegiert Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26295" }, { "cve": "CVE-2024-26296", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, privilegiert Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26296" }, { "cve": "CVE-2024-26297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, privilegiert Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26297" }, { "cve": "CVE-2024-26298", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, privilegiert Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26298" }, { "cve": "CVE-2024-26299", "notes": [ { "category": "description", "text": "In Aruba ClearPass Policy Manager existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden in in die webbasierte management interface nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, privilegiert Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26299" }, { "cve": "CVE-2024-26300", "notes": [ { "category": "description", "text": "In Aruba ClearPass Policy Manager existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden in in die webbasierte management interface nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, privilegiert Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26300" }, { "cve": "CVE-2024-26301", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. F\u00fcr eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26301" }, { "cve": "CVE-2024-26302", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Aruba ClearPass Policy Manager. Diese Fehler bestehen in der webbasierten Verwaltungsschnittstelle. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. F\u00fcr eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T023403" ] }, "release_date": "2024-02-27T23:00:00.000+00:00", "title": "CVE-2024-26302" } ] }
CVE-2024-26299 (GCVE-0-2024-26299)
Vulnerability from cvelistv5
Published
2024-02-27 22:05
Modified
2024-11-04 18:44
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-26299", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T18:16:03.637814Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-04T18:44:31.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "S4thi5h" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim\u0027s browser in the context of the affected interface.\u003c/p\u003e" } ], "value": "A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim\u0027s browser in the context of the affected interface.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:05:37.624Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26299", "datePublished": "2024-02-27T22:05:37.624Z", "dateReserved": "2024-02-16T19:42:43.186Z", "dateUpdated": "2024-11-04T18:44:31.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26295 (GCVE-0-2024-26295)
Vulnerability from cvelistv5
Published
2024-02-27 21:56
Modified
2024-08-02 00:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.11.6", "status": "affected", "version": "6.11.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.10.8_hotfix_q4_2023", "status": "affected", "version": "6.10.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.9.13_hotfix_q4_2023", "status": "affected", "version": "6.9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "status": "affected", "version": "6.12.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26295", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T17:06:06.521964Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T17:06:09.062Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\u003c/p\u003e" } ], "value": "Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T21:56:22.295Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26295", "datePublished": "2024-02-27T21:56:22.295Z", "dateReserved": "2024-02-16T19:42:43.185Z", "dateUpdated": "2024-08-02T00:07:19.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26300 (GCVE-0-2024-26300)
Vulnerability from cvelistv5
Published
2024-02-27 22:06
Modified
2024-11-07 11:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the guest interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-26300", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T20:30:02.698599Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T11:07:53.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Kajetan Rostojek (@kaje11)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA vulnerability in the guest interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim\u0027s browser in the context of the affected interface.\u003c/p\u003e" } ], "value": "A vulnerability in the guest interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim\u0027s browser in the context of the affected interface.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:06:49.616Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26300", "datePublished": "2024-02-27T22:06:49.616Z", "dateReserved": "2024-02-16T19:42:43.186Z", "dateUpdated": "2024-11-07T11:07:53.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26298 (GCVE-0-2024-26298)
Vulnerability from cvelistv5
Published
2024-02-27 22:04
Modified
2024-08-02 00:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.11.6", "status": "affected", "version": "6.11.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.10.8_hotfix_q4_2023", "status": "affected", "version": "6.10.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.9.13_hotfix_q4_2023", "status": "affected", "version": "6.9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "status": "affected", "version": "6.12.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T18:31:43.549918Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T17:06:46.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Kajetan Rostojek (@kaje11)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\u003c/p\u003e" } ], "value": "Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:04:58.511Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26298", "datePublished": "2024-02-27T22:04:58.511Z", "dateReserved": "2024-02-16T19:42:43.185Z", "dateUpdated": "2024-08-02T00:07:19.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26296 (GCVE-0-2024-26296)
Vulnerability from cvelistv5
Published
2024-02-27 21:57
Modified
2024-08-02 00:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.11.6", "status": "affected", "version": "6.11.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.10.8_hotfix_q4_2023", "status": "affected", "version": "6.10.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.9.13_hotfix_q4_2023", "status": "affected", "version": "6.9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "status": "affected", "version": "6.12.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26296", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T18:42:16.443596Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T17:04:58.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Kajetan Rostojek (@kaje11)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\u003c/p\u003e" } ], "value": "Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T21:57:24.846Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26296", "datePublished": "2024-02-27T21:57:24.846Z", "dateReserved": "2024-02-16T19:42:43.185Z", "dateUpdated": "2024-08-02T00:07:19.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26301 (GCVE-0-2024-26301)
Vulnerability from cvelistv5
Published
2024-02-27 22:10
Modified
2025-03-13 16:43
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-26301", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T16:54:02.591331Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T16:43:00.369Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Niels De Carpentier" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.\u003c/p\u003e" } ], "value": "A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:10:54.804Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26301", "datePublished": "2024-02-27T22:10:54.804Z", "dateReserved": "2024-02-16T19:42:43.186Z", "dateUpdated": "2025-03-13T16:43:00.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26302 (GCVE-0-2024-26302)
Vulnerability from cvelistv5
Published
2024-02-27 22:11
Modified
2024-11-05 15:10
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-26302", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-28T18:11:03.319147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:10:37.462Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Aruba ClearPass Policy Manager engineering team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.\u003c/p\u003e" } ], "value": "A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:11:37.929Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26302", "datePublished": "2024-02-27T22:11:37.929Z", "dateReserved": "2024-02-16T19:42:43.186Z", "dateUpdated": "2024-11-05T15:10:37.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26294 (GCVE-0-2024-26294)
Vulnerability from cvelistv5
Published
2024-02-27 21:54
Modified
2024-08-02 00:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.11.6", "status": "affected", "version": "6.11.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.10.8_hotfix_q4_2023", "status": "affected", "version": "6.10.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.9.13_hotfix_q4_2023", "status": "affected", "version": "6.9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "status": "affected", "version": "6.12.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T17:05:55.708273Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T17:05:58.925Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:18.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\u003c/p\u003e" } ], "value": "Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T21:54:21.857Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26294", "datePublished": "2024-02-27T21:54:21.857Z", "dateReserved": "2024-02-16T19:42:43.184Z", "dateUpdated": "2024-08-02T00:07:18.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26297 (GCVE-0-2024-26297)
Vulnerability from cvelistv5
Published
2024-02-27 22:03
Modified
2024-08-02 00:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba ClearPass Policy Manager |
Version: ClearPass Policy Manager 6.12.x: 6.12.0 Version: ClearPass Policy Manager 6.11.x: 6.11.6 and below Version: ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below Version: ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.11.6", "status": "affected", "version": "6.11.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.10.8_hotfix_q4_2023", "status": "affected", "version": "6.10.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "6.9.13_hotfix_q4_2023", "status": "affected", "version": "6.9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "clearpass_policy_manager", "vendor": "arubanetworks", "versions": [ { "status": "affected", "version": "6.12.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26297", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T17:05:17.518713Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T17:05:48.113Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba ClearPass Policy Manager", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "status": "affected", "version": "ClearPass Policy Manager 6.12.x: 6.12.0" }, { "status": "affected", "version": "ClearPass Policy Manager 6.11.x: 6.11.6 and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below" }, { "status": "affected", "version": "ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Kajetan Rostojek (@kaje11)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\u003c/p\u003e" } ], "value": "Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T22:03:55.507Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-26297", "datePublished": "2024-02-27T22:03:55.507Z", "dateReserved": "2024-02-16T19:42:43.185Z", "dateUpdated": "2024-08-02T00:07:19.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…