
=====================================================================

                                CERT-Renater

                    Note d'Information No. 2022/VULN456

_____________________________________________________________________

DATE                : 09/12/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Aruba ClearPass Policy Manager
                      versions prior to 6.11.0, 6.10.8, 6.9.13.

=====================================================================
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt
_____________________________________________________________________


Aruba Product Security Advisory
===============================
Advisory ID: ARUBA-PSA-2022-020
CVE: CVE-2002-20001, CVE-2022-43530, CVE-2022-43531,
      CVE-2022-43532, CVE-2022-43533, CVE-2022-43534,
      CVE-2022-43535, CVE-2022-43536, CVE-2022-43537,
      CVE-2022-43538, CVE-2022-43539, CVE-2022-43540
Publication Date: 2022-Dec-06
Status: Confirmed
Severity: High
Revision: 1


Title
=====
ClearPass Policy Manager Multiple Vulnerabilities


Overview
========
Aruba has released updates to ClearPass Policy Manager that
address multiple security vulnerabilities.


Affected Products
=================
These vulnerabilities affect ClearPass Policy Manager running
the following software versions unless specifically noted otherwise
in the details section:

   - ClearPass Policy Manager 6.10.x: 6.10.7 and below
   - ClearPass Policy Manager 6.9.x:  6.9.12 and below

Versions of ClearPass Policy Manager that are end of life are
affected by these vulnerabilities unless otherwise indicated.


Unaffected Products
===================
Any other Aruba products not specifically listed above are not
affected by these vulnerabilities.


Details
=======

   Authenticated SQL Injection Vulnerabilities in ClearPass
   Policy Manager Web-based Management Interface
   (CVE-2022-43530, CVE-2022-43531)
   ---------------------------------------------------------------------
     Vulnerabilities in the web-based management interface of
     ClearPass Policy Manager could allow an authenticated
     remote attacker to conduct SQL injection attacks against
     the ClearPass Policy Manager instance. An attacker could
     exploit these vulnerabilities to obtain and modify sensitive
     information in the underlying database potentially leading
     to complete compromise of the ClearPass Policy Manager
     cluster.

     Internal references: ATLCP-175, ATLCP-186
     Severity: High
     CVSSv3 Overall Score: 8.8
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

     Discovery: These vulnerabilities were discovered and
     reported by Luke Young (bugcrowd.com/bored-engineer) and
     Daniel Jensen (@dozernz) via Aruba's Bug Bounty Program.


   Authenticated Stored Cross-Site Scripting Vulnerability (XSS)
   in ClearPass Policy Manager Web-Based Management Interface
   (CVE-2022-43532)
   ---------------------------------------------------------------------
     A vulnerability in the web-based management interface of
     ClearPass Policy Manager could allow an authenticated remote
     attacker to conduct a stored cross-site scripting (XSS)
     attack against an administrative user of the interface. A
     successful exploit allows an attacker to execute arbitrary
     script code in a victim's browser in the context of the
     affected interface.

     Internal References: ATLCP-195
     Severity: High
     CVSSv3.x Overall Score: 8.0
     CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

     Discovery: This vulnerability was discovered and
     reported by Daniel Jensen (@dozernz) via Aruba's Bug Bounty
     Program.


   Local Privilege Escalation in ClearPass OnGuard macOS Agent
   (CVE-2022-43533)
   ---------------------------------------------------------------------
     A vulnerability in the ClearPass OnGuard macOS agent could
     allow malicious users on a macOS instance to elevate their
     user privileges. A successful exploit could allow these
     users to execute arbitrary code with root level privileges
     on the macOS instance.

     Internal references: ATLCP-204
     Severity: High
     CVSSv3 Overall Score: 7.8
     CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.


   Local Privilege Escalation in ClearPass OnGuard Linux Agent
   (CVE-2022-43534)
   ---------------------------------------------------------------------
     A vulnerability in the ClearPass OnGuard Linux agent could
     allow malicious users on a Linux instance to elevate their
     user privileges. A successful exploit could allow these
     users to execute arbitrary code with root level privileges
     on the Linux instance.

     Internal references: ATLCP-215
     Severity: High
     CVSSv3 Overall Score: 7.8
     CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.


   Local Privilege Escalation in ClearPass OnGuard Windows Agent
   (CVE-2022-43535)
   ---------------------------------------------------------------------
     A vulnerability in the ClearPass OnGuard Windows agent could
     allow malicious users on a Windows instance to elevate their
     user privileges. A successful exploit could allow these
     users to execute arbitrary code with NT AUTHORITY\SYSTEM
     level privileges on the Windows instance.

     Internal references: ATLCP-214
     Severity: High
     CVSSv3 Overall Score: 7.8
     CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.


    Diffie-Hellman Key Agreement Protocol Vulnerability
    (CVE-2002-20001)
   ---------------------------------------------------------------------
     The Diffie-Hellman Key Agreement Protocol allows remote
     attackers (from the client side) to send arbitrary numbers
     that are actually not public keys and trigger expensive
     server-side DHE modular-exponentiation calculations,
     aka a D(HE)ater attack. Successful exploitation of this
     vulnerability can lead to a denial-of-service attack.

     Internal Reference: ATLCP-173
     Severity: High
     CVSSv3.1 Overall Score: 7.5
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

     Discovery: This vulnerability was discovered and reported by
     Jean-francois Raymond and Anton Stiglic.

     Please see the following link for more details:
 
https://www.researchgate.net/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol


   Authenticated Remote Command Injection in ClearPass Policy
   Manager Web-Based Management Interface
   (CVE-2022-43536, CVE-2022-43537, CVE-2022-43538)
   ---------------------------------------------------------------------
     Vulnerabilities in the ClearPass Policy Manager web-based
     management interface allow remote authenticated users to
     run arbitrary commands on the underlying host. Successful
     exploits could allow an attacker to execute arbitrary commands
     as root on the underlying operating system leading to
     complete system compromise.

     Internal References: ATLCP-194, ATLCP-213, ATLCP-220
     Severity: High
     CVSSv3.x Overall Score: 7.2
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

     Discovery: These vulnerabilities were discovered and reported
     by Daniel Jensen (@dozernz) via Aruba's Bug Bounty Program.


   Sensitive Information Disclosure in ClearPass Policy Manager
   Cluster via Privileged Network Position
   (CVE-2022-43539)
   ---------------------------------------------------------------------
     A vulnerability exists in the ClearPass Policy Manager
     cluster communications that allow for an attacker in a
     privileged network position to potentially obtain sensitive
     information. A successful exploit could allow an attacker to
     retrieve information that allows for unauthorized actions as
     a privileged user on the ClearPass Policy Manager cluster.

     Internal Reference: ATLCP-221
     Severity: Medium
     CVSSv3.x Overall Score: 5.7
     CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L

     Discovery: This vulnerability was discovered and reported by
     the Vancouver Clinic.


   Sensitive Information Disclosure in ClearPass OnGuard macOS
   Agent
   (CVE-2022-43540)
   ---------------------------------------------------------------------
     A vulnerability exists in the ClearPass OnGuard macOS agent
     that allows for an attacker with local macOS instance access
     to potentially obtain sensitive information. A successful
     exploit could allow an attacker to retrieve information that
     is of a sensitive nature.

     Internal Reference: ATLCP-206
     Severity: Medium
     CVSSv3.x Overall Score: 5.5
     CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.


Resolution
==========
Upgrade ClearPass Policy Manager to one of the following versions
with the fixes to resolve all issues noted in the details
section.

   - ClearPass Policy Manager 6.11.x: 6.11.0 and above
   - ClearPass Policy Manager 6.10.x: 6.10.8 and above
   - ClearPass Policy Manager 6.9.x:  6.9.13 and above

Aruba does not evaluate or patch ClearPass Policy Manager
versions that have reached their End of Support (EoS) milestone.

Supported versions as of the publication date of this advisory
are:
   - ClearPass Policy Manager 6.11.x
   - ClearPass Policy Manager 6.10.x
   - ClearPass Policy Manager 6.9.x

For more information about Aruba's End of Support policy visit:
https://www.arubanetworks.com/support-services/end-of-life/


Workaround
==========
To minimize the likelihood of an attacker exploiting these
vulnerabilities, Aruba recommends that the CLI and web-based
management interfaces for ClearPass Policy Manager be restricted
to a dedicated layer 2 segment/VLAN and/or controlled by firewall
policies at layer 3 and above


ClearPass Policy Manager Security Hardening
===========================================
For general information on hardening ClearPass Policy
Manager instances against security threats please see the
ClearPass Policy Manager Hardening Guide available at
https://support.hpe.com/hpesc/public/docDisplay?docId=a00091066en_us
for ClearPass Policy Manager 6.9.x and earlier versions.

For ClearPass 6.10.x the ClearPass Policy
Manager Hardening Guide is available at
https://www.arubanetworks.com/techdocs/ClearPass/6.10/PolicyManager/Content/home.htm

For ClearPass 6.11.x The ClearPass Policy
Manager Hardening guide is available at
https://www.arubanetworks.com/techdocs/ClearPass/6.11/PolicyManager/Content/home.htm


Exploitation and Public Discussion
==================================
Aruba is not aware of any public discussion or exploit code that
target these specific vulnerabilities as of the release date of
the advisory.


Revision History
================
Revision 1 / 2022-Dec-06 / Initial release


Aruba SIRT Security Procedures
==============================
Complete information on reporting security vulnerabilities in
Aruba Networks products and obtaining assistance with security
incidents is available at:

https://www.arubanetworks.com/support-services/security-bulletins/


For reporting *NEW* Aruba Networks security issues, email can
be sent to aruba-sirt(at)hpe.com. For sensitive information we
encourage the use of PGP encryption. Our public keys can be found
at:

https://www.arubanetworks.com/support-services/security-bulletins/


(c) Copyright 2022 by Aruba, a Hewlett Packard Enterprise
company. This advisory may be redistributed freely after the
release date given at the top of the text, provided that the
redistributed copies are complete and unmodified, including all
data and version information.

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


