Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPAN-SA-2019-0033
HistoryOct 01, 2019 - 7:00 a.m.

Server-side Request Forgery in Zingbox Inspector

2019-10-0107:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
43

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

35.9%

A security vulnerability exists in the Zingbox Inspector that can allow an attacker to easily identify instances of Zingbox Inspectors in a local area network. (Ref: CVE-2019-15021)
The vulnerability allows for an attacker to easily identify any running instances of Zingbox Inspector on a local area network.
This issue affects Zingbox Inspector, versions 1.294 and earlier.

Work around:
In the normal course of operation, Zingbox Inspector automatically updates its own software, and a fixed version of software has already been made available. No user action is required unless the software is unable to update itself. Customers still running affected versions of Zingbox Inspector software can mitigation this issue by updating to a patched version, or by explicitly allowlisting access from the Zingbox Inspector to only the Zingbox cloud for updates by using a firewall.

Affected configurations

Vulners
Node
softwarezingbox_inspectorRange1.294
VendorProductVersionCPE
softwarezingbox_inspector*cpe:2.3:a:software:zingbox_inspector:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

35.9%

Related for PAN-SA-2019-0033