[h=2]Remote support functionality exposes WSAv, ESAv and SMAv[/h] Default SSH (Secure Shell) keys hard-coded in three security software appliances from Cisco could be used by unauthorized parties to connect to the products with elevated privileges or decrypt traffic passing through them.
Cisco found that Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv) have the same authorized SSH keys and SSH host keys across all installations.
[h=3]One of the flaws has critical severity[/h] The vulnerability is part of the remote support functionality and affects all versions of the products, including VMware-based images, and the KVM-based image in the case of WSAv.