{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:01:49.147","vulnerabilities":[{"cve":{"id":"CVE-2025-23059","sourceIdentifier":"security-alert@hpe.com","published":"2025-02-04T18:15:35.570","lastModified":"2025-03-28T17:53:08.257","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager exposes directories containing sensitive information. If exploited successfully, this vulnerability allows an authenticated remote attacker with high privileges to access and retrieve sensitive data, potentially compromising the integrity and security of the entire system."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web de HPE Aruba Networking ClearPass Policy Manager expone directorios que contienen información confidencial. Si se explota con éxito, esta vulnerabilidad permite que un atacante remoto autenticado con privilegios elevados acceda y recupere datos confidenciales, lo que podría comprometer la integridad y la seguridad de todo sistema."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.0","versionEndExcluding":"6.11.10","matchCriteriaId":"2788E2CB-BCF1-4FAB-BB44-9C82649C6C00"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.0","versionEndExcluding":"6.12.4","matchCriteriaId":"B1F83541-D3BE-4B1F-B4F5-8A951746A27A"}]}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04784en_us&docLocale=en_US","source":"security-alert@hpe.com","tags":["Vendor Advisory"]}]}}]}