ID CVE-2019-15023 Type cve Reporter cve@mitre.org Modified 2020-02-17T16:15:00
Description
A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration.
{"symantec": [{"lastseen": "2019-10-03T16:28:17", "bulletinFamily": "software", "cvelist": ["CVE-2019-15023"], "description": "### Description\n\nPalo Alto Networks Zingbox Inspector is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. Versions prior to Zingbox Inspector 1.295 are vulnerable.\n\n### Technologies Affected\n\n * Paloaltonetworks Zingbox Inspector 1.294 \n\n### Recommendations\n\n**Block external access at the network boundary, unless external parties require service.** \nFilter access to the affected computer at the network boundary if global access isn't needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit. \n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights. \n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nNIDS may identify and block generic attacks against web applications. Detecting and suspicious HTTP requests may reduce the likelihood of successful exploits. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-10-01T00:00:00", "published": "2019-10-01T00:00:00", "id": "SMNTC-110292", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110292", "type": "symantec", "title": "Palo Alto Networks Zingbox Inspector CVE-2019-15023 Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "paloalto": [{"lastseen": "2020-12-24T13:20:54", "bulletinFamily": "software", "cvelist": ["CVE-2019-15023"], "description": "A security vulnerability exists in Zingbox Inspector that results in passwords for 3rd party integrations being stored in cleartext in device configuration. (Ref: CVE-2019-15023)\nThe vulnerability allows for the viewing of plaintext credentials stored within the Zingbox Inspector software and stored configuration files.\nThis issue affects Zingbox Inspector, versions 1.294 and earlier.\n\n**Work around:**\nIn the normal course of operation, Zingbox Inspector automatically updates its own software, and a fixed version of software has already been made available. No user action is required unless the software is unable to update itself. Customers still running affected versions of Zingbox Inspector software can mitigation this issue by updating to a patched version, or by disabling any 3rd party integrations configured within Zingbox Inspector where 3rd party credentials are required and stored within the Zingbox Inspector software. See product documentation for more information on how to disable 3rd party integrations.", "edition": 4, "modified": "2019-10-01T07:00:00", "published": "2019-10-01T07:00:00", "id": "PAN-SA-2019-0035", "href": "https://securityadvisories.paloaltonetworks.com/CVE-2019-15023", "title": "Insecure Password Storage in Zingbox Inspector", "type": "paloalto", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}