Lucene search

K
cve[email protected]CVE-2014-8779
HistoryFeb 03, 2015 - 4:59 p.m.

CVE-2014-8779

2015-02-0316:59:00
CWE-254
web.nvd.nist.gov
36
pexip infinity
cve-2014-8779
ssh
man-in-the-middle attack
security vulnerability

6.6 Medium

AI Score

Confidence

Low

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:C/A:N

0.001 Low

EPSS

Percentile

40.9%

Pexip Infinity before 8 uses the same SSH host keys across different customers’ installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.

6.6 Medium

AI Score

Confidence

Low

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:C/A:N

0.001 Low

EPSS

Percentile

40.9%

Related for CVE-2014-8779