SB2024122009 - Multiple vulnerabilities in HPE Aruba Networking ClearPass Policy Manager



SB2024122009 - Multiple vulnerabilities in HPE Aruba Networking ClearPass Policy Manager

Published: December 20, 2024

Security Bulletin ID SB2024122009
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Code Injection (CVE-ID: CVE-2024-51771)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A remote authenticated user can pass specially crafted OGNL input via the web-based management interface and execute arbitrary code on the system.


2) Deserialization of Untrusted Data (CVE-ID: CVE-2024-51772)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the web-based management interface. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.



3) Stored cross-site scripting (CVE-ID: CVE-2024-51773)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) OS Command Injection (CVE-ID: CVE-2024-53672)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation within the web-based management interface. A remote authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.



Remediation

Install update from vendor's website.