The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Advisories
Source ID Title
EUVD EUVD EUVD-2015-4240 The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T06:11:11.355Z

Reserved: 2015-06-04T00:00:00

Link: CVE-2015-4217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-06-26T10:59:04.343

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-4217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.