CVE-2022-23672

7.2 HIGH

📋 TL;DR

This CVE describes an authenticated remote command injection vulnerability in Aruba ClearPass Policy Manager. Attackers with valid credentials can execute arbitrary commands on affected systems, potentially compromising the entire ClearPass deployment. Organizations running vulnerable versions of ClearPass Policy Manager are affected.

💻 Affected Systems

Products:
  • Aruba ClearPass Policy Manager
Versions: 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below
Operating Systems: ClearPass appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with system privileges, steal sensitive data, deploy ransomware, or pivot to other network resources.

🟠

Likely Case

Attackers with stolen or compromised credentials gain persistent access to the ClearPass system, potentially intercepting authentication traffic or modifying network access policies.

🟢

If Mitigated

With proper network segmentation, credential protection, and monitoring, impact is limited to the ClearPass system itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection vulnerabilities are typically straightforward to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.10.5, 6.9.10, 6.8.9-HF3, or later versions

Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-007.txt

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Aruba support portal. 2. Backup current configuration. 3. Apply patch following Aruba's upgrade documentation. 4. Restart the ClearPass appliance. 5. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative access to ClearPass to only trusted IP addresses and users

Configure firewall rules to restrict access to ClearPass management interface

Implement credential protection

all

Enforce strong passwords, multi-factor authentication, and regular credential rotation for all administrative accounts

Enable MFA in ClearPass Admin UI: Administration > Administrators > Edit User > Enable MFA

🧯 If You Can't Patch

  • Isolate ClearPass system in a dedicated VLAN with strict firewall rules limiting inbound/outbound connections
  • Implement network monitoring and IDS/IPS rules to detect command injection attempts and unusual administrative activity

🔍 How to Verify

Check if Vulnerable:

Check ClearPass version in Admin UI: Administration > Support > About. Compare against affected versions list.

Check Version:

ssh admin@clearpass-host 'cat /etc/version' or check Admin UI

Verify Fix Applied:

Verify version shows 6.10.5, 6.9.10, 6.8.9-HF3 or later in Admin UI. Test administrative functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful login
  • Administrative actions from unexpected IP addresses or users

Network Indicators:

  • Unusual outbound connections from ClearPass appliance
  • Traffic patterns suggesting data exfiltration
  • Unexpected administrative protocol traffic

SIEM Query:

source="clearpass" AND (event_type="command_execution" OR user="admin" AND action="shell")

🔗 References

📤 Share & Export