Vulnerabilites related to Hewlett Packard Enterprise - Aruba ClearPass
cve-2018-7058
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 06:17
Severity ?
Summary
Aruba ClearPass, all versions of 6.6.x prior to 6.6.9 are affected by an authentication bypass vulnerability, an attacker can leverage this vulnerability to gain administrator privileges on the system. The vulnerability is exposed only on ClearPass web interfaces, including administrative, guest captive portal, and API. Customers who do not expose ClearPass web interfaces to untrusted users are impacted to a lesser extent.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise Aruba ClearPass Version: 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.489Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Aruba ClearPass",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1",
                  },
               ],
            },
         ],
         datePublic: "2018-03-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Aruba ClearPass, all versions of 6.6.x prior to 6.6.9 are affected by an authentication bypass vulnerability, an attacker can leverage this vulnerability to gain administrator privileges on the system. The vulnerability is exposed only on ClearPass web interfaces, including administrative, guest captive portal, and API. Customers who do not expose ClearPass web interfaces to untrusted users are impacted to a lesser extent.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "authentication bypass can lead to server compromise",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-06T19:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7058",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Aruba ClearPass",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Aruba ClearPass, all versions of 6.6.x prior to 6.6.9 are affected by an authentication bypass vulnerability, an attacker can leverage this vulnerability to gain administrator privileges on the system. The vulnerability is exposed only on ClearPass web interfaces, including administrative, guest captive portal, and API. Customers who do not expose ClearPass web interfaces to untrusted users are impacted to a lesser extent.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "authentication bypass can lead to server compromise",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
                     refsource: "CONFIRM",
                     url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7058",
      datePublished: "2018-08-06T20:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.489Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-9001
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 16:55
Severity ?
Summary
Aruba ClearPass 6.6.3 and later includes a feature called "SSH Lockout", which causes ClearPass to lock accounts with too many login failures through SSH. When this feature is enabled, an unauthenticated remote command execution vulnerability is present which could allow an unauthenticated user to execute arbitrary commands on the underlying operating system with "root" privilege level. This vulnerability is only present when a specific feature has been enabled. The SSH Lockout feature is not enabled by default, so only systems which have enabled this feature are vulnerable.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise Aruba ClearPass Version: All versions prior to 6.6.8
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:55:21.846Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Aruba ClearPass",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "All versions prior to 6.6.8",
                  },
               ],
            },
         ],
         datePublic: "2017-09-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Aruba ClearPass 6.6.3 and later includes a feature called \"SSH Lockout\", which causes ClearPass to lock accounts with too many login failures through SSH. When this feature is enabled, an unauthenticated remote command execution vulnerability is present which could allow an unauthenticated user to execute arbitrary commands on the underlying operating system with \"root\" privilege level. This vulnerability is only present when a specific feature has been enabled. The SSH Lockout feature is not enabled by default, so only systems which have enabled this feature are vulnerable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "unauthenticated remote command execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-06T19:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2017-9001",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Aruba ClearPass",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions prior to 6.6.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Aruba ClearPass 6.6.3 and later includes a feature called \"SSH Lockout\", which causes ClearPass to lock accounts with too many login failures through SSH. When this feature is enabled, an unauthenticated remote command execution vulnerability is present which could allow an unauthenticated user to execute arbitrary commands on the underlying operating system with \"root\" privilege level. This vulnerability is only present when a specific feature has been enabled. The SSH Lockout feature is not enabled by default, so only systems which have enabled this feature are vulnerable.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "unauthenticated remote command execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
                     refsource: "CONFIRM",
                     url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2017-9001",
      datePublished: "2018-08-06T20:00:00",
      dateReserved: "2017-05-15T00:00:00",
      dateUpdated: "2024-08-05T16:55:21.846Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7060
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 06:17
Severity ?
Summary
Aruba ClearPass 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1 is vulnerable to CSRF attacks against authenticated users. An attacker could manipulate an authenticated user into performing actions on the web administrative interface.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise Aruba ClearPass Version: 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:17:17.380Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Aruba ClearPass",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1",
                  },
               ],
            },
         ],
         datePublic: "2018-03-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Aruba ClearPass 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1 is vulnerable to CSRF attacks against authenticated users. An attacker could manipulate an authenticated user into performing actions on the web administrative interface.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "authenticated sessions are vulnerable to cross site request forgery (CSRF)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-06T19:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2018-7060",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Aruba ClearPass",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Aruba ClearPass 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1 is vulnerable to CSRF attacks against authenticated users. An attacker could manipulate an authenticated user into performing actions on the web administrative interface.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "authenticated sessions are vulnerable to cross site request forgery (CSRF)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
                     refsource: "CONFIRM",
                     url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-003.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2018-7060",
      datePublished: "2018-08-06T20:00:00",
      dateReserved: "2018-02-15T00:00:00",
      dateUpdated: "2024-08-05T06:17:17.380Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-9002
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 16:55
Severity ?
Summary
All versions of Aruba ClearPass prior to 6.6.8 contain reflected cross-site scripting vulnerabilities. By exploiting this vulnerability, an attacker who can trick a logged-in ClearPass administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into ClearPass in the same browser.
Impacted products
Vendor Product Version
Hewlett Packard Enterprise Aruba ClearPass Version: All versions prior to v6.6.8
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:55:21.313Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Aruba ClearPass",
               vendor: "Hewlett Packard Enterprise",
               versions: [
                  {
                     status: "affected",
                     version: "All versions prior to v6.6.8",
                  },
               ],
            },
         ],
         datePublic: "2017-09-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "All versions of Aruba ClearPass prior to 6.6.8 contain reflected cross-site scripting vulnerabilities. By exploiting this vulnerability, an attacker who can trick a logged-in ClearPass administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into ClearPass in the same browser.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "reflected cross-site scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-08-06T19:57:01",
            orgId: "eb103674-0d28-4225-80f8-39fb86215de0",
            shortName: "hpe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-alert@hpe.com",
               ID: "CVE-2017-9002",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Aruba ClearPass",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions prior to v6.6.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Hewlett Packard Enterprise",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "All versions of Aruba ClearPass prior to 6.6.8 contain reflected cross-site scripting vulnerabilities. By exploiting this vulnerability, an attacker who can trick a logged-in ClearPass administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into ClearPass in the same browser.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "reflected cross-site scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
                     refsource: "CONFIRM",
                     url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-004.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0",
      assignerShortName: "hpe",
      cveId: "CVE-2017-9002",
      datePublished: "2018-08-06T20:00:00",
      dateReserved: "2017-05-15T00:00:00",
      dateUpdated: "2024-08-05T16:55:21.313Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}