Description
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Published: 2015-06-26
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2015-4240 The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
History

No history.

Subscriptions

Cisco Content Security Management Virtual Appliance Email Security Virtual Appliance Web Security Virtual Appliance
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T06:11:11.355Z

Reserved: 2015-06-04T00:00:00.000Z

Link: CVE-2015-4217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-26T10:59:04.343

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-4217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses