CVE-2025-23060
Published: 04 February 2025
Summary
CVE-2025-23060 is a medium-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Arubanetworks Clearpass Policy Manager. Its CVSS base score is 6.6 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 26.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SC-8 (Transmission Confidentiality and Integrity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires cryptographic protection of confidentiality and integrity for transmitted information, directly preventing cleartext exposure of sensitive data and man-in-the-middle attacks in ClearPass Policy Manager.
Mandates timely remediation of identified flaws, such as this cleartext transmission vulnerability, to eliminate the root cause and prevent exploitation.
Ensures authenticity of communications sessions, specifically countering man-in-the-middle attacks enabled by the unencrypted sensitive information exposure.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Cleartext transmission vulnerability (CWE-319) directly facilitates man-in-the-middle attacks for intercepting sensitive data and enabling tampering, as explicitly described.
NVD Description
A vulnerability in HPE Aruba Networking ClearPass Policy Manager may, under certain circumstances, expose sensitive unencrypted information. Exploiting this vulnerability could allow an attacker to perform a man-in-the-middle attack, potentially granting unauthorized access to network resources as well as enabling…
more
data tampering.
Deeper analysisAI
CVE-2025-23060 is a vulnerability in HPE Aruba Networking ClearPass Policy Manager that may, under certain circumstances, expose sensitive unencrypted information. Classified under CWE-319 (Cleartext Transmission of Sensitive Information), it carries a CVSS v3.1 base score of 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-02-04.
The vulnerability can be exploited over the network by an attacker possessing high privileges (PR:H), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation enables a man-in-the-middle attack, potentially granting unauthorized access to network resources and allowing data tampering, with high impacts on confidentiality, integrity, and availability.
Mitigation details are available in the HPE advisory at https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04784en_us&docLocale=en_US.
Details
- CWE(s)