Cisco Patches Security Products Against Hard-Coded SSH Key

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
[h=2]Remote support functionality exposes WSAv, ESAv and SMAv[/h] Default SSH (Secure Shell) keys hard-coded in three security software appliances from Cisco could be used by unauthorized parties to connect to the products with elevated privileges or decrypt traffic passing through them.

Cisco found that Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv) have the same authorized SSH keys and SSH host keys across all installations.

[h=3]One of the flaws has critical severity[/h] The vulnerability is part of the remote support functionality and affects all versions of the products, including VMware-based images, and the KVM-based image in the case of WSAv.
Cisco Patches Security Products Against Hard-Coded SSH Key - Softpedia
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top