Potential vulnerability in SecureTrack
If Tufin SecureTrack is monitoring Cisco Firewalls and Routers, credentials to authenticate SecureTrack here need to be provided. Now it has been found, that the Enable Password may be exposed in a log file. This has been rated as "High Severity Vulnerability".
Please note that the password is shown in a log file of SecureTrack only, so only administrators with CLI access might get this information, but no unauthenticated attackers.
Affected versions of SecureTrack are R17-1, R17-2, R17-3, R18-1, R18-2 and R18-3, respectively.
A vulnerability fix will be included in HFs for supported versions:
- TOS 18-1: Fix is included in R18-1 HF3.1 which will be published November 4th, 2018
- TOS 18-2: Fix is included in R18-2 HF1 which will be published Novermber 7th, 2018
- TOS 18-3: Fix is included in R18-3 RC1.1 which will be published November 4th, 2018
If you use an older version please plan an update to a version supported by Tufin.
Newer versions of Tufin Orchestration Suite will have the Fix included.