Vulnerability Details CVE-2015-4217
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 75.0%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2015-4217
-
cpe:2.3:a:cisco:content_security_management_virtual_appliance:8.4.0.0150
-
cpe:2.3:a:cisco:content_security_management_virtual_appliance:9.0.0.087
-
cpe:2.3:a:cisco:email_security_virtual_appliance:8.0.0
-
cpe:2.3:a:cisco:email_security_virtual_appliance:8.5.6
-
cpe:2.3:a:cisco:email_security_virtual_appliance:8.5.7
-
cpe:2.3:a:cisco:email_security_virtual_appliance:9.0.0
-
cpe:2.3:a:cisco:web_security_virtual_appliance:7.7.5
-
cpe:2.3:a:cisco:web_security_virtual_appliance:8.0.5
-
cpe:2.3:a:cisco:web_security_virtual_appliance:8.5.0
-
cpe:2.3:a:cisco:web_security_virtual_appliance:8.5.1
-
cpe:2.3:a:cisco:web_security_virtual_appliance:8.6.0
-
cpe:2.3:a:cisco:web_security_virtual_appliance:8.7.0