Security

 View Only
  • 1.  Impacket alerts on new ClearPass servers

    Posted May 24, 2025 05:11 AM

    Does anyone have anything official/definitive for why brand new ClearPass servers would trip alerts for the presence of Impacket tools? These are band new Azure VMs, created from the Azure Marketplace model from HPE, version 6.12. The servers are accessible from internal only, they do not have public IPs, so I would think the chances that both times someone was able to hack them at the same point is extremely slim. We saw the same alerts some months ago when we built a couple of CP servers with version 6.11 as well. At the time. our MSP indicated that they have seen it with new ClearPass servers on other clients they have that use Aruba equipment. I've run multiple searches but nobody seems to have posted about the ClearPass/Impacket combination so I'd like to get more than a single anecdotal confirmation that it is a false positive. I'm aware that Impacket is basically just an open source python set of tools that are notably used by some hacking tools, but seem to have legit uses also.

    Can anyone clarify further?

    TIA
    John



  • 2.  RE: Impacket alerts on new ClearPass servers

    Posted May 26, 2025 10:09 AM

    Hi

    I don't have the answer you are looking for. In this case I would recommend working with your local HPE Aruba representative and SE to get the answers you need.



    ------------------------------
    Best Regards
    Jonas Hammarbäck
    MVP Guru, ACEX, ACDX #1600, ACCX #1335, ACX-Network Security
    Aranya AB
    If you find my answer useful, consider giving kudos and/or mark as solution
    ------------------------------



  • 3.  RE: Impacket alerts on new ClearPass servers

    Posted May 30, 2025 09:38 AM

    As you mention, impacket has a legitimate use too. It's just a tool to work on low level with network packets: https://pypi.org/project/impacket/

    It's not malicious, but is just popular in hacking tools as well. I can confirm that it's installed on my ClearPass servers as well.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 4.  RE: Impacket alerts on new ClearPass servers
    Best Answer

    Posted May 30, 2025 10:50 AM

    Finally heard back from HPE:

    They confirmed that this is a Known issue that has been already raised up to their engineering team. The recommend upgrading to ClearPass v6.12.2 to avoid alerts like those ones.

    Regarding the Impacket library, those are installed as a part of the ClearPass policy manager. They're used to enable the Agentless OnGuard on windows machines. If that is configured, then the files are executed. If Agentless OnGuard is not configured, then the files are not executed




  • 5.  RE: Impacket alerts on new ClearPass servers

    Posted Jun 01, 2025 11:02 PM

    Thanks I am also getting these and was hoping I could verify the filehash even though I was 99% sure it was a false alert.

    Are you also using Defender for Cloud?

    As for upgrading to 6.12.2 - I'm already on 6.12.4 so that sounds like hand-waving again. Once we're certain I'll just put in an exception for Defender for Cloud.

    The URL MS supplied in the alert doesn't work :|
    https://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?name=HackTool:Python/Impacketsmbrelax.A\




  • 6.  RE: Impacket alerts on new ClearPass servers

    Posted 22 days ago

    Hi,

    I also being asked same thing to customer, but apparently perhaps they never read fully that their report also pointing me to this thread.

    I am currently already patched theirs to 6.12.7

    Dear Client,
    We have observed similar Azure Microsoft Defender for Cloud security alerts on the Azure virtual machine <cust_cppm_node>2, which appears to be a ClearPass Policy Manager (CPPM) server(image ID: hewlettpackardenterprise1:aruba_cppm_6-12:clearpass_6_12_0:latest) created on 7 April 2026. Additionally, the instance is exposed to 1054 vulnerabilities, including 565 classified as critical or high by Orca. No high/critical severity risks or Attack Paths were detected.
    The following agentless alerts were generated on the VM:
    •	"Impacketsmbrelax" hacktool detected (Agentless)
    •	"Impacket" hacktool detected (Agentless)
    •	"Sharpscshell" malware detected (Agentless)
    Initial analysis indicates that these alerts may have been triggered by the presence of Impacket version 0.9.22 installed on the server. Based on publicly available HPE Aruba ClearPass community discussions, Impacket is included as part of the ClearPass Policy Manager software stack and is typically utilized only when Agentless OnGuard functionality is configured and in use.
    While ClearPass may legitimately include Impacket binaries, Microsoft Defender may still flag these components due to their dual use nature. Additionally, the Sharpscshell detection is not a standard ClearPass component, and therefore warrants further validation to rule out the presence of unrelated suspicious files or potential compromise.
    To accurately determine whether these alerts represent benign ClearPass components, it is essential to validate the exact files, file paths, or hashes that triggered the detections.
    Reference:
    https://airheads.hpe.com/discussion/impacket-alerts-on-new-clearpass-servers - HPE Aruba ClearPass community discussion
    https://app.orcasecurity.io/alerts/orca-134818 - Orca alert link
    Recommendations:
    Given that VM <cust_cppm_node>2 was only recently deployed and is running ClearPass Policy Manager, the alerts may be associated with legitimate application components. To proceed with a definitive assessment, we kindly request your assistance with the following:
    1.	Provide or review the alert details (file names, file paths, and hashes) from the Azure Defender alerts so that Lumen can perform a deeper validation.
    2.	Confirm with HPE Aruba whether: 
    o	Impacket version 0.9.22 and related packages are required for your ClearPass deployment.
    3.	If confirmed as benign, consider suppressing these alerts using Azure Defender alert suppression rules to prevent recurring false positives:
    https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-suppression-rules
    Azure Alert Links:
    •	Sharpscshell malware detected (Agentless):
    https://portal.azure.com/#blade/Microsoft_Azure_Security_AzureDefenderForData/AlertBlade/alertId/cc604d02-be55-3dce-dc15-dffb65177315/subscriptionId/e631b7cf-0649-428d-8f77-d0846901b1fd/resourceGroup/AGS-SH-CPPM1-RG/referencedFrom/alertDeepLink/location/centralus
    •	Impacket hacktool detected (Agentless):
    https://portal.azure.com/#blade/Microsoft_Azure_Security_AzureDefenderForData/AlertBlade/alertId/569bcc25-dcbf-25b9-bfc8-f0c6a81392dc/subscriptionId/e631b7cf-0649-428d-8f77-d0846901b1fd/resourceGroup/AGS-SH-CPPM1-RG/referencedFrom/alertDeepLink/location/centralus
    •	Impacketsmbrelax hacktool detected (Agentless):
    
    -------------------------------------------



  • 7.  RE: Impacket alerts on new ClearPass servers

    Posted 21 days ago

    Please open a TAC case and refer to CP-48248. According to the previous information versions higher than 6.12.2 should not have impacket.

    IF you have upgraded the ClearPass appliance, it may be that the backup partition still has an older version, and this check seems to work on the raw disks. Upgrading again may resolve the message.

    Regardless, I think you can ignore the alert as ClearPass is not a general purpose operating system and users can't login to use that tool.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------