4.3
CVSSv2

CVE-2015-4217

Published: 26/06/2015 Updated: 28/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices prior to 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco web security virtual appliance 8.6.0

cisco web security virtual appliance 8.5.1

cisco web security virtual appliance 8.5.0

cisco web security virtual appliance 8.0.5

cisco content security management virtual appliance 8.4.0.0150

cisco content security management virtual appliance 9.0.0.087

cisco email security virtual appliance 9.0.0

cisco email security virtual appliance 8.5.7

cisco email security virtual appliance 8.0.0

cisco email security virtual appliance 8.5.6

cisco web security virtual appliance 8.7.0

cisco web security virtual appliance 7.7.5

Vendor Advisories

Cisco Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv) are affected by the following vulnerabilities: Cisco Virtual WSA, ESA, and SMA Default Authorized SSH Key Vulnerability Cisco Virtual WSA, ESA, and SMA Default SSH Host Keys Vulnerability Cis ...
A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to decrypt and impersonate secure communication between any virtual content security appliances The vulnerability is due to the presence of default SSH host keys that are shared across all the ins ...