Vulnerability CVE-2014-8779


Published: 2015-02-03

Description:
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Pexip Infinity Non-Unique SSH Host Keys
giles
30.01.2015

Type:

CWE-254

(Security Features)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:C/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.1/10
6.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Complete
None
Affected software
Pexip -> Pexip infinity 

 References:
http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html
http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf
http://www.securityfocus.com/archive/1/534576/100/0/threaded
http://www.securityfocus.com/bid/72359

Copyright 2024, cxsecurity.com

 

Back to Top