{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:21:26.489","vulnerabilities":[{"cve":{"id":"CVE-2023-43508","sourceIdentifier":"security-alert@hpe.com","published":"2023-10-25T18:17:31.990","lastModified":"2024-11-21T08:24:10.990","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in the web-based management interface of ClearPass Policy Manager allow an attacker with read-only privileges to perform actions that change the state of the ClearPass Policy Manager instance. Successful exploitation of these vulnerabilities allow an attacker to complete state-changing actions in the web-based management interface that should not be allowed by their current level of authorization on the platform."},{"lang":"es","value":"Las vulnerabilidades en la interfaz de administración basada en web de ClearPass Policy Manager permiten que un atacante con privilegios de solo lectura realice acciones que cambien el estado de la instancia de ClearPass Policy Manager. La explotación exitosa de estas vulnerabilidades permite a un atacante completar acciones de cambio del estado en la interfaz de administración basada en web que no deberían estar permitidas por su nivel actual de autorización en la plataforma."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9.13","matchCriteriaId":"124117E4-FE27-43AB-B5F5-B4EFCA767430"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.0","versionEndExcluding":"6.10.8","matchCriteriaId":"84F5E56D-039C-47B0-827A-AFE34887DAD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.0","versionEndIncluding":"6.11.4","matchCriteriaId":"349AD8EE-ECFF-469B-80E6-0ABFDEF55A2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:-:*:*:*:*:*:*","matchCriteriaId":"57C5BF92-A455-44E4-AE20-F9A1D790422D"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:cumulative_hotfix_patch_2:*:*:*:*:*:*","matchCriteriaId":"7962FD34-6A38-461A-8942-BCA227AF8AF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:cumulative_hotfix_patch_3:*:*:*:*:*:*","matchCriteriaId":"435A3CE6-AB76-4F4F-B11F-71E0C7619A9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:-:*:*:*:*:*:*","matchCriteriaId":"1DB2448F-D014-4672-90A9-3BCC91096B93"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:cumulative_hotfix_patch_2:*:*:*:*:*:*","matchCriteriaId":"80F47102-7F9F-449F-91A1-76372AA7F3D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:cumulative_hotfix_patch_5:*:*:*:*:*:*","matchCriteriaId":"F85708F3-CA05-472A-9B51-373D1AD14E9C"}]}]}],"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}