Lucene search

K
symantecSymantec Security ResponseSMNTC-110285
HistoryOct 01, 2019 - 12:00 a.m.

Palo Alto Networks Zingbox Inspector CVE-2019-15015 Hardcoded Credentials Vulnerability

2019-10-0100:00:00
Symantec Security Response
www.symantec.com
9

0.001 Low

EPSS

Percentile

30.6%

Description

Palo Alto Networks Zingbox Inspector is prone to a hard-coded credentials vulnerability. An attacker can exploit this issue to gain unauthorized access to the vulnerable system and perform unauthorized actions. Palo Alto Networks Zingbox Inspector version 1.294 and prior are vulnerable.

Technologies Affected

  • Paloaltonetworks Zingbox Inspector 1.280
  • Paloaltonetworks Zingbox Inspector 1.281
  • Paloaltonetworks Zingbox Inspector 1.288
  • Paloaltonetworks Zingbox Inspector 1.289
  • Paloaltonetworks Zingbox Inspector 1.294

Recommendations

Block external access at the network boundary, unless external parties require service.
Filter access to the affected computer at the network boundary if global access isn’t needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.

Updates are available. Please see the references or vendor advisory for more information.

0.001 Low

EPSS

Percentile

30.6%

Related for SMNTC-110285