Lucene search

K
ZingboxInspector1.294

6 matches found

CVE
CVE
added 2019/10/09 9:15 p.m.75 views

CVE-2019-15023

A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration.

7.5CVSS7.4AI score0.00148EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.68 views

CVE-2019-15017

The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an attacker to authenticate to the service using hardcoded credentials.

8.4CVSS8.1AI score0.00043EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.67 views

CVE-2019-15022

A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that allows for the Inspector to be susceptible to ARP spoofing.

7.5CVSS7.4AI score0.00198EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.63 views

CVE-2019-15021

A security vulnerability exists in the Zingbox Inspector versions 1.294 and earlier, that can allow an attacker to easily identify instances of Zingbox Inspectors in a local area network.

5.3CVSS5.1AI score0.00206EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.61 views

CVE-2019-15015

In the Zingbox Inspector, versions 1.294 and earlier, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system.

8.4CVSS8AI score0.00043EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.58 views

CVE-2019-15019

A security vulnerability exists in the Zingbox Inspector versions 1.294 and earlier, that could allow an attacker to supply an invalid software update image to the Zingbox Inspector.

9.8CVSS9.3AI score0.00433EPSS