CVE-2024-26295

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Feb 27, 2024
Updated: Feb 28, 2024

Summary

The CVE-2024-26295 vulnerability affects the ClearPass Policy Manager web-based management interface. It allows remote authenticated users to execute arbitrary commands on the underlying host. This could lead to complete system compromise as the attacker can run commands as root on the underlying operating system. The base severity of this vulnerability is rated as HIGH, with a base score of 7.2 out of 10. The exploitability score is 1.2 out of 10, indicating a relatively easy exploit. The impact score is 5.9 out of 10, highlighting the potential danger it poses to organizations. It has been classified as a secondary type cyber vulnerability and the scope remains unchanged. To remediate this vulnerability, organizations should apply patches or updates provided by the vendor to fix the issue and enhance security measures for the ClearPass Policy Manager web-based management interface. Note: As there is no actual source text provided, the information in this report is based on the provided metadata for CVE-2024-26295 and general knowledge about vulnerabilities in network devices and web-based management interfaces.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-26295 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions