=====================================================================

                                CERT-Renater

                      Note d'Information No. 2023/VULN433

_____________________________________________________________________

DATE                : 25/10/2023

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running ClearPass Policy Manager versions
             prior to 6.11.5, 6.10.8 Hotfix Q4 2023 for Security issues,
                    6.9.13 Hotfix Q4 2023 for Security issues.

=====================================================================
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt
_____________________________________________________________________

HPE Aruba Networking Product Security Advisory
===============================
Advisory ID: ARUBA-PSA-2023-016
CVE: CVE-2023-43506, CVE-2023-43507, CVE-2023-43508,
      CVE-2023-43509, CVE-2023-43510
Publication Date: 2023-Oct-24
Status: Confirmed
Severity: High
Revision: 1


Title
=====
ClearPass Policy Manager Multiple Vulnerabilities


Overview
========
HPE Aruba Networking has released updates to ClearPass Policy
Manager that address multiple security vulnerabilities.


Affected Products
=================
These vulnerabilities affect ClearPass Policy Manager running
the following software versions unless specifically noted
otherwise in the details section:

   - ClearPass Policy Manager 6.11.x: 6.11.4 and below
   - ClearPass Policy Manager 6.10.x: 6.10.8 with ClearPass 6.10.8
     Cumulative Hotfix Patch 5 and below
   - ClearPass Policy Manager 6.9.x: 6.9.13 with ClearPass 6.9.13
     Cumulative Hotfix Patch 3 and below

Versions of ClearPass Policy Manager that are end of life are
affected by these vulnerabilities unless otherwise indicated.


Unaffected Products
===================
Any other HPE Aruba Networking products not specifically listed
above are not affected by these vulnerabilities.


Details
=======

   Local Privilege Escalation in ClearPass OnGuard Linux Agent
   (CVE-2023-43506)
   ---------------------------------------------------------------------
     A vulnerability in the ClearPass OnGuard Linux agent could
     allow malicious users on a Linux instance to elevate their
     user privileges to those of a higher role. A successful
     exploit allows malicious users to execute arbitrary code
     with root level privileges on the Linux instance.

     Internal references: ATLCP-248
     Severity: High
     CVSSv3 Overall Score: 7.8
     CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.

     Workaround: None


   Authenticated SQL Injection Vulnerability in ClearPass Policy
   Manager Web-based Management Interface
   (CVE-2023-43507)
   ---------------------------------------------------------------------
     A vulnerability in the web-based management interface of
     ClearPass Policy Manager could allow an authenticated
     remote attacker to conduct SQL injection attacks against
     the ClearPass Policy Manager instance. An attacker could
     exploit this vulnerability to obtain and modify sensitive
     information in the underlying database potentially leading
     to complete compromise of the ClearPass Policy Manager
     cluster.

     Internal references: ATLCP-255
     Severity: High
     CVSSv3 Overall Score: 7.2
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored_engineer) via Aruba's Bug
     Bounty Program.

     Workaround: To minimize the likelihood of an attacker
     exploiting this vulnerability, HPE Aruba Networking
     recommends that the web-based management interfaces be
     restricted to a dedicated layer 2 segment/VLAN and/or
     controlled by firewall policies at layer 3 and above.


   Authorization Bypass Leading to Privilege Escalation in
   ClearPass Policy Manager Web-Based Management Interface
   (CVE-2023-43508)
   ---------------------------------------------------------------------
     Vulnerabilities in the web-based management interface of
     ClearPass Policy Manager allow an attacker with read-only
     privileges to perform actions that change the state of the
     ClearPass Policy Manager instance. Successful exploitation
     of these vulnerabilities allow an attacker to complete
     state-changing actions in the web-based management interface
     that should not be allowed by their current level of
     authorization on the platform.

     Internal References: ATLCP-238, ATLCP-239, ATLCP-240,
                          ATLCP-244
     Severity: Medium
     CVSSv3.x Overall Score: 6.3
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

     Discovery: These vulnerabilities were discovered and
     reported by Mateusz Dabrowski (dbrwsky).

     Workaround: To minimize the likelihood of an attacker
     exploiting this vulnerability, HPE Aruba Networking
     recommends that the web-based management interfaces be
     restricted to a dedicated layer 2 segment/VLAN and/or
     controlled by firewall policies at layer 3 and above.


   Unauthenticated Endpoint Allows Sending Arbitrary OnGuard
   Notifications
   (CVE-2023-43509)
   ---------------------------------------------------------------------
     A vulnerability in the web-based management interface of
     ClearPass Policy Manager could allow an unauthenticated
     remote attacker to send notifications to computers that are
     running ClearPass OnGuard. These notifications can then be
     used to phish users or trick them into downloading malicious
     software.

     Internal references: ATLCP-233
     Severity: Medium
     CVSSv3 Overall Score: 5.8
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

     Discovery: This vulnerability was discovered and reported
     by Luke Young (bugcrowd.com/bored-engineer) via Aruba's Bug
     Bounty Program.

     Workaround: To minimize the likelihood of an attacker
     exploiting this vulnerability, HPE Aruba Networking
     recommends that the web-based management interfaces be
     restricted to a dedicated layer 2 segment/VLAN and/or
     controlled by firewall policies at layer 3 and above.


   Authenticated Remote Command Injection in ClearPass Policy
   Manager Web-Based Management Interface Leading to Partial
   System Compromise
   (CVE-2023-43510)
   ---------------------------------------------------------------------
     A vulnerability in the ClearPass Policy Manager web-based
     management interface allows remote authenticated users to
     run arbitrary commands on the underlying host. A successful
     exploit could allow an attacker to execute arbitrary
     commands as a non-privileged user on the underlying
     operating system leading to partial system compromise.

     Internal References: ATLCP-230
     Severity: Medium
     CVSSv3.x Overall Score: 4.7
     CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

     Discovery: This vulnerability was discovered and reported by
     Daniel Jensen (@dozernz) via Aruba's Bug Bounty Program.

     Workaround: To minimize the likelihood of an attacker
     exploiting this vulnerability, HPE Aruba Networking
     recommends that the web-based management interfaces be
     restricted to a dedicated layer 2 segment/VLAN and/or
     controlled by firewall policies at layer 3 and above.


Resolution
==========
Upgrade ClearPass Policy Manager to one of the following
versions with the fixes to resolve all issues noted in the
details section.

   - ClearPass Policy Manager 6.11.x: 6.11.5 and above
   - ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4
     2023 for Security issues and above
   - ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4
     2023 for Security issues and above

HPE Aruba Networking does not evaluate or patch ClearPass Policy
Manager versions that have reached their End of Support (EoS)
milestone.

Supported versions as of the publication date of this advisory
are:
   - ClearPass Policy Manager 6.11.x
   - ClearPass Policy Manager 6.10.x
   - ClearPass Policy Manager 6.9.x

For more information about HPE Aruba Networking's End of Support
policy visit:
https://www.arubanetworks.com/support-services/end-of-life/


Workaround
==========
Vulnerability specific workarounds are listed per vulnerability
above. Contact HPE Services - Aruba Networking for any
configuration assistance.


ClearPass Policy Manager Security Hardening
===========================================
For general information on hardening ClearPass Policy Manager
instances against security threats please see the ClearPass
Policy Manager Hardening Guide.

For ClearPass 6.11.x, the ClearPass Policy
Manager Hardening guide is available at
https://www.arubanetworks.com/techdocs/ClearPass/6.11/PolicyManager/Content/home.htm

For ClearPass 6.10.x, the ClearPass Policy
Manager Hardening Guide is available at
https://www.arubanetworks.com/techdocs/ClearPass/6.10/PolicyManager/Content/home.htm

For ClearPass 6.9.x and earlier, the ClearPass
Policy Manager Hardening Guide is available
at https://support.hpe.com/hpesc/public/docDisplay?docId=a00091066en_us


Exploitation and Public Discussion
==================================
HPE Aruba Networking is not aware of any public discussion or
exploit code that target these specific vulnerabilities as of
the release date of the advisory.


Revision History
================
Revision 1 / 2023-Oct-24 Initial release


HPE Aruba Networking SIRT Security Procedures
==============================
Complete information on reporting security vulnerabilities in HPE
Aruba Networking products and obtaining assistance with security
incidents is available at:

https://www.arubanetworks.com/support-services/security-bulletins/

For reporting *NEW* HPE Aruba Networking security issues, email
can be sent to aruba-sirt(at)hpe.com. For sensitive information
we encourage the use of PGP encryption. Our public keys can be
found at:

https://www.arubanetworks.com/support-services/security-bulletins/

(c) Copyright 2023 by Hewlett Packard Enterprise Development LP.
This advisory may be redistributed freely after the release date
given at the top of the text, provided that the redistributed
copies are complete and unmodified, including all data and
version information.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
