SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Email Security Appliance Vendors:   Cisco
Cisco Email Security Virtual Appliance Default SSH Keys Let Remote Users Gain Full Control of the Target System
SecurityTracker Alert ID:  1032725
SecurityTracker URL:  http://securitytracker.com/id/1032725
CVE Reference:   CVE-2015-4216, CVE-2015-4217   (Links to External Site)
Date:  Jun 25 2015
Impact:   Disclosure of system information, Modification of system information, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): versions prior to June 25, 2015
Description:   Two vulnerabilities were reported in Cisco Email Security Virtual Appliance (ESAv). A remote user can gain full control the target system. A remote user can decrypt and impersonate communications between target devices.

The system uses common default authorized SSH keys [CVE-2015-4216]. A remote user that can obtain the SSH private key can connect to the management interface with root privileges on the target device.

The vendor has assigned bug ID CSCuu95994 to this vulnerability.

The system uses common default SSH host keys [CVE-2015-4217]. A remote user that can monitor traffic to or from the management interface and can obtain one of the SSH host keys can impersonate secure communication between arbitrary virtual content security appliances.

The vendor has assigned bug ID CSCuu95676 to this vulnerability.

VMware-based images are affected by these vulnerabilities.

Impact:   A remote user can gain root access on the target system.

A remote user can can impersonate secure communication between arbitrary virtual content security appliances.

Solution:   The vendor has issued a patch. Virtual appliance systems that were downloaded or upgraded before June 25, 2015 should apply the patch.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport (Links to External Site)
Cause:   Configuration error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC