CVE-2022-37878

Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
References () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt - Vendor Advisory () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt - Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-77 CWE-78

Information

Published : 2022-09-20 20:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-37878

Mitre link : CVE-2022-37878

CVE.ORG link : CVE-2022-37878


JSON object : View

Products Affected

arubanetworks

  • clearpass_policy_manager
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')