{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T18:23:00.503","vulnerabilities":[{"cve":{"id":"CVE-2022-37884","sourceIdentifier":"security-alert@hpe.com","published":"2022-09-20T20:15:10.367","lastModified":"2025-05-28T16:15:26.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability exists in the ClearPass Policy Manager Guest User Interface that can allow an unauthenticated attacker to send specific operations which result in a Denial-of-Service condition. A successful exploitation of this vulnerability results in the unavailability of the guest interface in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability."},{"lang":"es","value":"Se presenta una vulnerabilidad en la Interfaz de Usuario de ClearPass Policy Manager Guest que puede permitir a un atacante no autenticado enviar operaciones específicas que resulten en una condición de denegación de servicio. Una explotación con éxito de esta vulnerabilidad resulta en la indisponibilidad de la interfaz de invitado en  Aruba ClearPass Policy Manager versión(es): 6.10.x: 6.10.6 y anteriores; 6.9.x: 6.9.11 y anteriores. Aruba ha publicado actualizaciones para Aruba ClearPass Policy Manager que abordan esta vulnerabilidad de seguridad"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9.0","versionEndExcluding":"6.9.12","matchCriteriaId":"57F180BC-B95D-4B3A-9C1C-38611C4B80C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.0","versionEndExcluding":"6.10.7","matchCriteriaId":"327E889C-2867-4E82-AB1A-2D47735D5EF5"}]}]}],"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-013.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}