Информационная безопасность
[RU] switch to English


Ключи по умолчанию в Cisco Virtual WSA / ESA / SMA
Опубликовано:29 июня 2015 г.
Источник:
SecurityVulns ID:14551
Тип:удаленная
Уровень опасности:
6/10
Описание:Установлены дефолтные SSH-ключи одинаковые для всех устройств.
CVE:CVE-2015-4217 (The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.)
 CVE-2015-4216 (The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.)
Файлы: Cisco Security Advisory Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород