First published: Fri Jun 26 2015(Updated: )
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Security Management virtual Appliance | =8.4.0.0150 | |
Cisco Content Security Management virtual Appliance | =9.0.0.087 | |
Cisco Email Security Virtual Appliance | =8.0.0 | |
Cisco Email Security Virtual Appliance | =8.5.6 | |
Cisco Email Security Virtual Appliance | =8.5.7 | |
Cisco Email Security Virtual Appliance | =9.0.0 | |
Cisco Web Security Virtual Appliance | =7.7.5 | |
Cisco Web Security Virtual Appliance | =8.0.5 | |
Cisco Web Security Virtual Appliance | =8.5.0 | |
Cisco Web Security Virtual Appliance | =8.5.1 | |
Cisco Web Security Virtual Appliance | =8.6.0 | |
Cisco Web Security Virtual Appliance | =8.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4216 has a high severity rating due to the use of default SSH root authorized keys in multiple installations.
To mitigate CVE-2015-4216, users should change the default SSH root authorized key and ensure that all appliances are updated to the latest software version.
CVE-2015-4216 affects Cisco Web Security Virtual Appliance, Email Security Virtual Appliance, and Security Management Virtual Appliance before the specified patch date.
CVE-2015-4216 allows unauthorized access to devices due to the common SSH root key across different users, posing a significant security risk.
Admins can check the device's SSH configuration and compare software versions against Cisco's advisory to identify if they are affected by CVE-2015-4216.