Lucene search

K
symantecSymantec Security ResponseSMNTC-110396
HistoryOct 01, 2019 - 12:00 a.m.

Palo Alto Networks Zingbox Inspector CVE-2019-15021 Security Bypass Vulnerability

2019-10-0100:00:00
Symantec Security Response
www.symantec.com
8

0.001 Low

EPSS

Percentile

35.9%

Description

Palo Alto Networks Zingbox Inspector is prone to a security-bypass vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. Versions prior to Zingbox Inspector 1.295 are vulnerable.

Technologies Affected

  • Paloaltonetworks Zingbox Inspector 1.294

Recommendations

Block external access at the network boundary, unless external parties require service.
Filter access to the affected computer at the network boundary if global access isn’t needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
NIDS may identify and block generic attacks against web applications. Detecting and suspicious HTTP requests may reduce the likelihood of successful exploits.

Updates are available. Please see the references or vendor advisory for more information.

0.001 Low

EPSS

Percentile

35.9%

Related for SMNTC-110396