SB2019100305 - Multiple vulnerabilities in Palo Alto Zingbox Inspector
Published: October 3, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Insufficient verification of data authenticity (CVE-ID: CVE-2019-1584)
The vulnerability allows a remote attacker to compromise the affected system.
the vulnerability exists due to Zingbox Inspector accepts and executes commands sent from a trusted Zingbox cloud, authenticated with PKI. A remote attacker with ability to perform man-in-the-middle (MitM) attack can execute arbitrary commands on the affected system.
2) OS Command Injection (CVE-ID: CVE-2019-15014)
The vulnerability allows a local user to execute arbitrary shell commands on the target system.
The vulnerability exists in the Zingbox Inspector CLI. A localuser can execute arbitrary OS commands on the target system within the product CLI console.
3) SQL injection (CVE-ID: CVE-2019-15016)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Zingbox Inspector management interface. A remote authenticated user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
4) Use of hard-coded credentials (CVE-ID: CVE-2019-15015)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code for root and inspector user account. A remote unauthenticated attacker can access the affected system using the hard-coded credentials via SSH server that is also exposed by default.
5) Improper Authentication (CVE-ID: CVE-2019-15018)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to absent authentication checks when binding tenants. A remote authenticated user can bind the Inspector instance to a different customer tenant.
6) Download of code without integrity check (CVE-ID: CVE-2019-15019)
The vulnerability allows a remote attacker to compromise the affected system
The vulnerability exists due to software does not perform software integrity check when downloading firmware updates. A remote attacker with ability to perform man-in-the-middle (MitM) attack can supply a malicious firmware image and gain full control over the affected system after a successful software update.
7) Download of code without integrity check (CVE-ID: CVE-2019-15020)
The vulnerability allows a remote attacker to compromise the affected system
The vulnerability exists due to software does not perform software integrity check when downloading updates. A remote attacker with ability to perform man-in-the-middle (MitM) attack can supply a malicious software image and gain full control over the affected system after a successful software update.
8) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2019-15021)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request to Zingbox Inspector and identify any running instances of Zingbox Inspector on a local area network.
9) ARP spoofing (CVE-ID: CVE-2019-15022)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to absence of protection against ARP spoofing. A remote attacker can spoof ARP packets and gain unauthorized access to Zingbox Inspector.
10) Unprotected storage of credentials (CVE-ID: CVE-2019-15023)
The vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.
Remediation
Install update from vendor's website.
References
- https://securityadvisories.paloaltonetworks.com/Home/Detail/164
- https://securityadvisories.paloaltonetworks.com/Home/Detail/167
- https://securityadvisories.paloaltonetworks.com/Home/Detail/173
- https://securityadvisories.paloaltonetworks.com/Home/Detail/170
- https://securityadvisories.paloaltonetworks.com/Home/Detail/176
- https://securityadvisories.paloaltonetworks.com/Home/Detail/179
- https://securityadvisories.paloaltonetworks.com/Home/Detail/182
- https://securityadvisories.paloaltonetworks.com/Home/Detail/185
- https://securityadvisories.paloaltonetworks.com/Home/Detail/188
- https://securityadvisories.paloaltonetworks.com/Home/Detail/191
- https://securityadvisories.paloaltonetworks.com/Home/Detail/194