The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
Advisories
Source ID Title
EUVD EUVD EUVD-2015-4239 The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T06:11:11.761Z

Reserved: 2015-06-04T00:00:00

Link: CVE-2015-4216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-26T10:59:03.327

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-4216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.