CA20190930-01: Security Notice for CA Network Flow Analysis
1875
05 November 2020
03 October 2019
CLOSED
High
Issued: September 30th, 2019
Last Updated: October 1, 2019
CA Technologies, a Broadcom Company, is alerting customers to a potential risk with CA Network Flow Analysis. A vulnerability exists that can allow a remote attacker to execute arbitrary commands. CA published a solution to address the vulnerabilities and recommends that all affected customers implement this solution.
The vulnerability, CVE-2019-13658, occurs due to default credentials and a configuration weakness. A malicious actor may use the default credentials and exploit a weakness in the configuration to execute arbitrary commands on the CA Network Flow Analysis server.
Risk Rating
High
Platform(s)
All supported platforms
Affected Products
CA Network Flow Analysis 10.0.x
CA Network Flow Analysis 9.x
How to determine if the installation is affected
Customers may use the product version to determine if their product installation is affected.
Solution
The following solution is available to address the vulnerability. Note that the typical deployment of CA Network Flow Analysis is in an internal network and system administrators should restrict access to sensitive ports (see Firewall Configuration) on the CA Network Flow Analysis server.
CA Network Flow Analysis 9.x and 10.0.x:
Customers should update to CA Network Flow Analysis 10.0.2 or later and change the MySQL passwords as described at Configure MySQL User Password.
References
CVE-2019-13658 - CA Network Flow Analysis default credentials
Acknowledgement
CVE-2019-13658 - Hendrik Van Belleghem
Change History
Version 1.0: 2019-09-30 - Initial Release
Version 2.0: 2019-10-01 - Clarified affected releases
CA customers may receive product alerts and advisories by subscribing to Proactive Notifications.
Customers who require additional information about this notice may contact CA Technologies Support at https://casupport.broadcom.com/.
To report a suspected vulnerability in a CA Technologies product, please send a summary to the CA Technologies Product Vulnerability Response Team.