{"api_version":"1","generated_at":"2026-04-23T00:40:22+00:00","cve":"CVE-2023-43507","urls":{"html":"https://cve.report/CVE-2023-43507","api":"https://cve.report/api/cve/CVE-2023-43507.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-43507","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-43507"},"summary":{"title":"CVE-2023-43507","description":"A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster.","state":"PUBLIC","assigner":"security-alert@hpe.com","published_at":"2023-10-25 18:17:00","updated_at":"2023-11-01 16:22:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt","name":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt","refsource":"MISC","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-43507","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-43507","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.10.8","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.10.8","cpe7":"cumulative_hotfix_patch_2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.10.8","cpe7":"cumulative_hotfix_patch_5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.9.13","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.9.13","cpe7":"cumulative_hotfix_patch_2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"6.9.13","cpe7":"cumulative_hotfix_patch_3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"43507","vulnerable":"1","versionEndIncluding":"6.11.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"arubanetworks","cpe5":"clearpass_policy_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-43507","ASSIGNER":"security-alert@hpe.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Hewlett Packard Enterprise (HPE)","product":{"product_data":[{"product_name":"Aruba ClearPass Policy Manager","version":{"version_data":[{"version_affected":"<=","version_name":"ClearPass Policy Manager 6.11.x: 6.11.4 and below","version_value":"<=6.11.4"},{"version_affected":"=","version_value":"ClearPass Policy Manager 6.10.x: 6.10.8 with ClearPass 6.10.8 Cumulative Hotfix Patch 5 and below"},{"version_affected":"=","version_value":"ClearPass Policy Manager 6.9.x: 6.9.13 with ClearPass 6.9.13 Cumulative Hotfix Patch 3 and below"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt","refsource":"MISC","name":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"Luke Young (bugcrowd.com/bored_engineer)"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-25 18:17:00","lastModifiedDate":"2023-11-01 16:22:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.0","versionEndIncluding":"6.11.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9.13","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.0","versionEndExcluding":"6.10.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:cumulative_hotfix_patch_2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.13:cumulative_hotfix_patch_3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:cumulative_hotfix_patch_2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.8:cumulative_hotfix_patch_5:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}