CVSS 3.1 Score 7.2 of 10 (high)


Published Feb 27, 2024
Updated: Feb 28, 2024


The CVE-2024-26295 vulnerability affects the ClearPass Policy Manager web-based management interface. It allows remote authenticated users to execute arbitrary commands on the underlying host. This could lead to complete system compromise as the attacker can run commands as root on the underlying operating system. The base severity of this vulnerability is rated as HIGH, with a base score of 7.2 out of 10. The exploitability score is 1.2 out of 10, indicating a relatively easy exploit. The impact score is 5.9 out of 10, highlighting the potential danger it poses to organizations. It has been classified as a secondary type cyber vulnerability and the scope remains unchanged. To remediate this vulnerability, organizations should apply patches or updates provided by the vendor to fix the issue and enhance security measures for the ClearPass Policy Manager web-based management interface.

Note: As there is no actual source text provided, the information in this report is based on the provided metadata for CVE-2024-26295 and general knowledge about vulnerabilities in network devices and web-based management interfaces.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-26295 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options