If Tufin SecureTrack is monitoring Cisco Firewalls and Routers, credentials to authenticate SecureTrack here need to be provided. Now it has been found, that the Enable Password may be exposed in a log file. This has been rated as "High Severity Vulnerability".
Please note that the password is shown in a log file of SecureTrack only, so only administrators with CLI access might get this information, but no unauthenticated attackers.
Affected versions of SecureTrack are R17-1, R17-2, R17-3, R18-1, R18-2 and R18-3, respectively.
A vulnerability fix will be included in HFs for supported versions:
- TOS 18-1: Fix is included in R18-1 HF3.1 which will be published November 4th, 2018
- TOS 18-2: Fix is included in R18-2 HF1 which will be published Novermber 7th, 2018
- TOS 18-3: Fix is included in R18-3 RC1.1 which will be published November 4th, 2018
If you use an older version please plan an update to a version supported by Tufin.
Newer versions of Tufin Orchestration Suite will have the Fix included.