Description
The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an attacker to authenticate to the service using hardcoded credentials.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-6104 | The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an attacker to authenticate to the service using hardcoded credentials. |
References
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2019-15017 |
|
History
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-08-05T00:34:53.065Z
Reserved: 2019-08-13T00:00:00.000Z
Link: CVE-2019-15017
No data.
Status : Modified
Published: 2019-10-09T21:15:12.837
Modified: 2024-11-21T04:27:52.883
Link: CVE-2019-15017
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD