Default SSH Host Key Reuse Vulnerability in Cisco Web Security Virtual Appliance, Email Security Virtual Appliance, and Security Management Virtual Appliance
CVE-2015-4217 · MEDIUM Severity
AV:N/AC:M/AU:N/C:P/I:N/A:N
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Learn more about our Cis Benchmark Audit For Cisco.