Описание
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Ссылки
- ExploitVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.0 (включая)
cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*
EPSS
Процентиль: 51%
0.00284
Низкий
7.1 High
CVSS2
Дефекты
CWE-254
Связанные уязвимости
github
больше 3 лет назад
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
EPSS
Процентиль: 51%
0.00284
Низкий
7.1 High
CVSS2
Дефекты
CWE-254