CVE-2021-29145

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical Server-Side Request Forgery (SSRF) vulnerability in Aruba ClearPass Policy Manager that can lead to remote code execution. Attackers can exploit this to make the server send unauthorized requests to internal systems and potentially execute arbitrary code. Organizations running affected versions of Aruba ClearPass Policy Manager are at risk.

💻 Affected Systems

Products:
  • Aruba ClearPass Policy Manager
Versions: Versions prior to 6.9.5, 6.8.9, 6.7.14-HF1
Operating Systems: Not specified - appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, access sensitive data, pivot to internal networks, and potentially maintain persistent access.

🟠

Likely Case

Unauthorized access to internal systems, data exfiltration, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only allowing information disclosure about internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities often have low exploitation complexity and can be chained with other vulnerabilities for RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.5, 6.8.9, or 6.7.14-HF1

Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-009.txt

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Aruba support portal. 2. Backup current configuration. 3. Apply the patch following Aruba's upgrade documentation. 4. Restart the ClearPass Policy Manager service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from ClearPass servers to only necessary internal services

Access Control Lists

all

Implement strict firewall rules to limit ClearPass server network communications

🧯 If You Can't Patch

  • Isolate ClearPass servers in a dedicated network segment with strict egress filtering
  • Implement web application firewall rules to detect and block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check ClearPass version via web interface or CLI. If version is below 6.9.5, 6.8.9, or 6.7.14-HF1, the system is vulnerable.

Check Version:

From ClearPass CLI: show version

Verify Fix Applied:

Verify the version has been updated to 6.9.5, 6.8.9, or 6.7.14-HF1 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from ClearPass server
  • Requests to internal IP ranges from ClearPass
  • Unexpected process execution on ClearPass server

Network Indicators:

  • ClearPass server making requests to unexpected internal services
  • Outbound connections to unusual ports from ClearPass

SIEM Query:

source="clearpass" AND (http_request OR network_connection) AND (dst_ip=internal_range OR dst_port!=common_ports)

🔗 References

📤 Share & Export