Описание
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-8779
- http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html
- http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf
- http://www.securityfocus.com/archive/1/534576/100/0/threaded
- http://www.securityfocus.com/bid/72359
EPSS
Процентиль: 51%
0.00284
Низкий
CVE ID
Связанные уязвимости
nvd
около 11 лет назад
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
EPSS
Процентиль: 51%
0.00284
Низкий