
====================================================================

                             CERT-Renater

                 Note d'Information No. 2019/VULN300

_____________________________________________________________________

DATE                : 02/10/2019

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running CA Network Flow Analysis versions
                                          9.x, 10.0.0.

=====================================================================
https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/new-security-notice-ca-20190930-01-security-notice-for-ca-network-flow-analysis.html
_____________________________________________________________________

CA20190930-01: Security Notice for CA Network Flow Analysis

Issued: September 30th, 2019

Last Updated: September 30th, 2019

CA Technologies, a Broadcom Company, is alerting customers to a
potential risk with CA Network Flow Analysis. A vulnerability
exists that can allow a remote attacker to execute arbitrary
commands. CA published a solution to address the vulnerabilities
and recommends that all affected customers implement this
solution.

The vulnerability, CVE-2019-13658, occurs due to default credentials
and a configuration weakness. A malicious actor may use the default
credentials and exploit a weakness in the configuration to execute
arbitrary commands on the CA Network Flow Analysis server.


Risk Rating

High


Platform(s)

All supported platforms


Affected Products

CA Network Flow Analysis 10.0.0

CA Network Flow Analysis 9.x


Unaffected Products

CA Network Flow Analysis 10.0.1 and later


How to determine if the installation is affected

Customers may use the product version to determine if their
product installation is affected.


Solution

The following solution is available to address the vulnerability.
Note that the typical deployment of CA Network Flow Analysis is in
an internal network and system administrators should restrict access
to sensitive ports (see Firewall Configuration ) on the CA Network
Flow Analysis server.

CA Network Flow Analysis 9.x and 10.0.0:

Customers should update to CA Network Flow Analysis 10.0.2 or later
and change the MySQL passwords as described at Configure MySQL User
Password .


References

CVE-2019-13658 - CA Network Flow Analysis default credentials


Acknowledgement

CVE-2019-13658 - Hendrik Van Belleghem


Change History

Version 1.0: 2019-09-30 - Initial Release

CA customers may receive product alerts and advisories by subscribing
to Proactive Notifications .

Customers who require additional information about this notice may
contact CA Technologies Support at https://casupport.broadcom.com/ .

To report a suspected vulnerability in a CA Technologies product,
please send a summary to the CA Technologies Product Vulnerability
Response Team .


=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================



