Pexip Infinity prior to 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle malicious users to spoof Management and Conferencing Nodes by leveraging these keys.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pexip pexip infinity |