Page 6 of 26 results (0.002 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys. Pexip Infinity anterior a 8 utiliza las claves de anfitrión SSH en diferentes instalaciones de sus clientes, lo que permite a atacantes man-in-the-middle falsificar nodos de gestión y de conferencia mediante el aprovechamiento de estas claves. • http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf http://www.securityfocus.com/archive/1/534576/100/0/threaded http://www.securityfocus.com/bid/72359 • CWE-254: 7PK - Security Features •