First published: Fri Jun 26 2015(Updated: )
The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH host keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a private key from another installation, aka Bug IDs CSCus29681, CSCuu95676, and CSCuu96601.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Security Management virtual Appliance | =8.4.0.0150 | |
Cisco Content Security Management virtual Appliance | =9.0.0.087 | |
Cisco Email Security Virtual Appliance | =8.0.0 | |
Cisco Email Security Virtual Appliance | =8.5.6 | |
Cisco Email Security Virtual Appliance | =8.5.7 | |
Cisco Email Security Virtual Appliance | =9.0.0 | |
Cisco Web Security Virtual Appliance | =7.7.5 | |
Cisco Web Security Virtual Appliance | =8.0.5 | |
Cisco Web Security Virtual Appliance | =8.5.0 | |
Cisco Web Security Virtual Appliance | =8.5.1 | |
Cisco Web Security Virtual Appliance | =8.6.0 | |
Cisco Web Security Virtual Appliance | =8.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4217 is classified as a high severity vulnerability due to the risk of unauthorized remote access.
To fix CVE-2015-4217, you should update your Cisco Web Security Virtual Appliance, Email Security Virtual Appliance, or Security Management Virtual Appliance to a version that addresses this vulnerability.
CVE-2015-4217 affects several Cisco appliances including versions of Web Security, Email Security, and Content Security Management Virtual Appliances prior to specific updates.
CVE-2015-4217 poses a risk of potential unauthorized access as multiple installations may share the same default SSH host keys.
Currently, the best workaround for CVE-2015-4217 is to disable remote support until a patch is applied.