Description
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
Published: 2015-06-26
Score: 5.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2015-4239 The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
History

No history.

Subscriptions

Cisco Content Security Management Virtual Appliance Email Security Virtual Appliance Web Security Virtual Appliance
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T06:11:11.761Z

Reserved: 2015-06-04T00:00:00.000Z

Link: CVE-2015-4216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-26T10:59:03.327

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-4216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses