Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt | Vendor Advisory | 
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    29 May 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-77 | 
21 Nov 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt - Vendor Advisory | 
Information
                Published : 2022-09-20 20:15
Updated : 2025-05-29 14:15
NVD link : CVE-2022-37883
Mitre link : CVE-2022-37883
CVE.ORG link : CVE-2022-37883
JSON object : View
Products Affected
                arubanetworks
- clearpass_policy_manager
CWE
                
                    
                        
                        NVD-CWE-noinfo
                        
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
