MEDIUM · 4.3

CVE-2015-4217

The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the ...

Vulnerability Description

The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
CiscoContent Security Management Virtual Appliance8.4.0.0150
CiscoEmail Security Virtual Appliance8.0.0
CiscoWeb Security Virtual Appliance7.7.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4217?

CVE-2015-4217 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the ...

How severe is CVE-2015-4217?

CVE-2015-4217 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4217?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Content Security Management Virtual Appliance, Cisco Email Security Virtual Appliance, Cisco Web Security Virtual Appliance.