Lucene search

K
ciscoCiscoCISCO-SA-20150625-IRONPORT
HistoryJun 25, 2015 - 4:00 p.m.

Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA

2015-06-2516:00:00
tools.cisco.com
38

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

58.7%

Cisco Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv) are affected by the following vulnerabilities:

Cisco Virtual WSA, ESA, and SMA Default Authorized SSH Key Vulnerability
Cisco Virtual WSA, ESA, and SMA Default SSH Host Keys Vulnerability

Cisco has released software updates that address these vulnerabilities.

There are no workarounds for these vulnerabilities.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport”]

Affected configurations

Vulners
Node
ciscocontent_security_management_virtual_applianceMatchany
OR
ciscoemail_security_virtual_applianceMatchany
OR
ciscoweb_security_virtual_applianceMatchany
OR
ciscocontent_security_management_virtual_applianceMatchany
OR
ciscoemail_security_virtual_applianceMatchany
OR
ciscoweb_security_virtual_applianceMatchany

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

58.7%

Related for CISCO-SA-20150625-IRONPORT