Vulnerability Details CVE-2020-7116
The ClearPass Policy Manager WebUI administrative interface has an authenticated command remote execution. When the attacker is already authenticated to the administrative interface, they could then exploit the system, leading to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.019
EPSS Ranking 82.6%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 9.0
Products affected by CVE-2020-7116
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.0
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.1
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.10
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.11
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.12
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.13
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.2
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.3
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.4
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.5
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.6
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.7
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.8
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.7.9
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.0
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.1
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.2
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.3
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.4
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.5
-
cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0