{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T21:51:29.296","vulnerabilities":[{"cve":{"id":"CVE-2021-26686","sourceIdentifier":"security-alert@hpe.com","published":"2021-02-23T18:15:13.990","lastModified":"2024-11-21T05:56:40.370","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote authenticated SQL Injection vulnerabilitiy was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface API of ClearPass could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database."},{"lang":"es","value":"Se detectó una vulnerabilidad de inyección SQL autenticada remota en Aruba ClearPass Policy Manager: versiones anteriores a 6.9.5, 6.8.8-HF1, 6.7.14-HF1.&#xa0;Una vulnerabilidad en la API de la interfaz de administración basada en web de ClearPass podría permitir a un atacante remoto autenticado conducir ataques de inyección SQL contra la instancia de ClearPass.&#xa0;Un atacante podría explotar esta vulnerabilidad para obtener y modificar información confidencial en la base de datos subyacente"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"6.7.14","matchCriteriaId":"B7D11F63-2289-47CA-A4C8-A5F80A0F6510"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8.0","versionEndExcluding":"6.8.7","matchCriteriaId":"861634EC-9068-4DBA-AE30-0A0C96C88542"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9.0","versionEndExcluding":"6.9.3","matchCriteriaId":"2F2A560A-FF32-46EE-B321-FF5A2767CCA2"}]}]}],"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-004.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-004.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}