CVE-2014-8779
Severity CVSS v4.0:
Pending analysis
Type:
CWE-254
Security Features
Publication date:
03/02/2015
Last modified:
12/04/2025
Description
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Impact
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:* | 7.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html
- http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf
- http://www.securityfocus.com/archive/1/534576/100/0/threaded
- http://www.securityfocus.com/bid/72359
- http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html
- http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf
- http://www.securityfocus.com/archive/1/534576/100/0/threaded
- http://www.securityfocus.com/bid/72359