Vulnerabilities (CVE)

Filtered by vendor Zingbox Subscribe
Filtered by product Inspector
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-15014 1 Zingbox 1 Inspector 2020-08-24 9.0 HIGH 8.8 HIGH
A command injection vulnerability exists in the Zingbox Inspector versions 1.286 and earlier, that allows for an authenticated user to execute arbitrary system commands in the CLI.
CVE-2019-15018 1 Zingbox 1 Inspector 2020-08-24 5.0 MEDIUM 7.5 HIGH
A security vulnerability exists in the Zingbox Inspector versions 1.280 and earlier, where authentication is not required when binding the Inspector instance to a different customer tenant.
CVE-2019-15016 1 Zingbox 1 Inspector 2020-02-17 6.5 MEDIUM 8.8 HIGH
An SQL injection vulnerability exists in the management interface of Zingbox Inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web UI into the database.
CVE-2019-15022 1 Zingbox 1 Inspector 2020-02-17 5.0 MEDIUM 7.5 HIGH
A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that allows for the Inspector to be susceptible to ARP spoofing.
CVE-2019-15023 1 Zingbox 1 Inspector 2020-02-17 5.0 MEDIUM 7.5 HIGH
A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that results in passwords for 3rd party integrations being stored in cleartext in device configuration.
CVE-2019-15017 1 Zingbox 1 Inspector 2020-02-17 7.2 HIGH 8.4 HIGH
The SSH service is enabled on the Zingbox Inspector versions 1.294 and earlier, exposing SSH to the local network. When combined with PAN-SA-2019-0027, this can allow an attacker to authenticate to the service using hardcoded credentials.
CVE-2019-15015 1 Zingbox 1 Inspector 2020-02-17 7.2 HIGH 8.4 HIGH
In the Zingbox Inspector, versions 1.294 and earlier, hardcoded credentials for root and inspector user accounts are present in the system software, which can result in unauthorized users gaining access to the system.