CVE-2024-51771

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary commands on HPE Aruba ClearPass Policy Manager systems through the web management interface. Organizations using affected ClearPass versions are at risk of complete system compromise.

💻 Affected Systems

Products:
  • HPE Aruba Networking ClearPass Policy Manager
Versions: All versions prior to 6.12.9, 6.13.5, and 6.14.0
Operating Systems: ClearPass OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web management interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement, and persistent backdoor installation across the network.

🟠

Likely Case

Attackers gain administrative control over ClearPass, allowing them to modify policies, steal credentials, and pivot to other network resources.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but could be combined with credential theft or social engineering

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.12.9, 6.13.5, or 6.14.0

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US

Restart Required: No

Instructions:

1. Backup ClearPass configuration. 2. Download appropriate patch version from HPE support portal. 3. Apply patch via ClearPass web interface or CLI. 4. Verify successful update.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to ClearPass web management interface to trusted IP addresses only

Configure firewall rules to restrict access to ClearPass management ports (TCP 443, 22)

Enforce Strong Authentication

all

Require multi-factor authentication for all administrative accounts

Enable MFA in ClearPass Policy Manager settings

🧯 If You Can't Patch

  • Implement network segmentation to isolate ClearPass from critical systems
  • Enable detailed logging and monitoring for suspicious authentication attempts and command execution

🔍 How to Verify

Check if Vulnerable:

Check ClearPass version via web interface (Admin > Support > About) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify version is 6.12.9, 6.13.5, or 6.14.0 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Unexpected command execution in system logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from ClearPass system
  • Traffic to unexpected ports or IP addresses

SIEM Query:

source="clearpass" AND (event_type="authentication" AND result="success" AND user="admin") OR (process_execution AND parent_process="web_server")

🔗 References

📤 Share & Export