CVE-2025-23058
Published: 04 February 2025
Summary
CVE-2025-23058 is a high-severity Weak Authentication (CWE-1390) vulnerability in Arubanetworks Clearpass Policy Manager. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations in the web management interface to prevent low-privileged read-only users from accessing data or executing restricted administrative functions.
Applies least privilege to restrict low-privileged users from performing administrative actions, directly countering the privilege escalation vulnerability.
Remediates the specific flaw in the ClearPass Policy Manager web interface that enables low-privileged users to execute admin-only functions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows a low-privileged authenticated remote attacker to bypass authorization in the web management interface and execute admin-only functions, directly enabling privilege escalation via software exploitation.
NVD Description
A vulnerability in the ClearPass Policy Manager web-based management interface allows a low-privileged (read-only) authenticated remote attacker to gain unauthorized access to data and the ability to execute functions that should be restricted to administrators only with read/write privileges. Successful…
more
exploitation could enable a low-privileged user to execute administrative functions leading to an escalation of privileges.
Deeper analysisAI
CVE-2025-23058 is a vulnerability in the ClearPass Policy Manager web-based management interface that allows a low-privileged (read-only) authenticated remote attacker to gain unauthorized access to data and execute functions restricted to administrators with read/write privileges. Successful exploitation enables a low-privileged user to perform administrative functions, leading to privilege escalation. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-1390. It was published on 2025-02-04.
The attack requires low privileges (read-only access) and can be carried out remotely over the network with low complexity and no user interaction. An attacker with such access can achieve unauthorized data access and execution of admin-only functions, resulting in full privilege escalation on the affected system.
Mitigation details are provided in the HPE security bulletin at https://support.hpesc/public/docDisplay?docId=hpesbnw04784en_us&docLocale=en_US.
Details
- CWE(s)