SB2019100305 - Multiple vulnerabilities in Palo Alto Zingbox Inspector 



SB2019100305 - Multiple vulnerabilities in Palo Alto Zingbox Inspector

Published: October 3, 2019

Security Bulletin ID SB2019100305
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 10% Medium 70% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Insufficient verification of data authenticity (CVE-ID: CVE-2019-1584)

The vulnerability allows a remote attacker to compromise the affected system.

the vulnerability exists due to Zingbox Inspector accepts and executes commands sent from a trusted Zingbox cloud, authenticated with PKI. A remote attacker with ability to perform man-in-the-middle (MitM) attack can execute arbitrary commands on the affected system.


2) OS Command Injection (CVE-ID: CVE-2019-15014)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists in the Zingbox Inspector CLI. A localuser can execute arbitrary OS commands on the target system within the product CLI console.


3) SQL injection (CVE-ID: CVE-2019-15016)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the Zingbox Inspector management interface. A remote authenticated user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


4) Use of hard-coded credentials (CVE-ID: CVE-2019-15015)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code for root and inspector user account. A remote unauthenticated attacker can access the affected system using the hard-coded credentials via SSH server that is also exposed by default.


5) Improper Authentication (CVE-ID: CVE-2019-15018)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to absent authentication checks when binding tenants. A remote authenticated user can bind the Inspector instance to a different customer tenant.


6) Download of code without integrity check (CVE-ID: CVE-2019-15019)

The vulnerability allows a remote attacker to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading firmware updates. A remote attacker with ability to perform man-in-the-middle (MitM) attack can supply a malicious firmware image and gain full control over the affected system after a successful software update.


7) Download of code without integrity check (CVE-ID: CVE-2019-15020)

The vulnerability allows a remote attacker to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading updates. A remote attacker with ability to perform man-in-the-middle (MitM) attack can supply a malicious software image and gain full control over the affected system after a successful software update.


8) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2019-15021)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request to Zingbox Inspector and identify any running instances of Zingbox Inspector on a local area network.


9) ARP spoofing (CVE-ID: CVE-2019-15022)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to absence of protection against ARP spoofing. A remote attacker can spoof ARP packets and gain unauthorized access to Zingbox Inspector.


10) Unprotected storage of credentials (CVE-ID: CVE-2019-15023)

The vulnerability allows a local user to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.


Remediation

Install update from vendor's website.