4.3
CVE-2015-4217
- EPSS 0.68%
- Veröffentlicht 26.06.2015 10:59:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Content Security Management Virtual Appliance Version8.4.0.0150
Cisco ≫ Content Security Management Virtual Appliance Version9.0.0.087
Cisco ≫ Email Security Virtual Appliance Version8.0.0
Cisco ≫ Email Security Virtual Appliance Version8.5.6
Cisco ≫ Email Security Virtual Appliance Version8.5.7
Cisco ≫ Email Security Virtual Appliance Version9.0.0
Cisco ≫ Web Security Virtual Appliance Version7.7.5
Cisco ≫ Web Security Virtual Appliance Version8.0.5
Cisco ≫ Web Security Virtual Appliance Version8.5.0
Cisco ≫ Web Security Virtual Appliance Version8.5.1
Cisco ≫ Web Security Virtual Appliance Version8.6.0
Cisco ≫ Web Security Virtual Appliance Version8.7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.68% | 0.707 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.