Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Virtual WSA, ESA, and SMA Default SSH Host Keys Vulnerability

Cisco-SA-20150625-CVE-2015-4217 · Medium · Published · Updated

A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to decrypt and impersonate secure communication between any virtual content security appliances.  The vulnerability is due to the presence of default SSH host keys that are shared across all the installations of WSAv, ESAv, and SMAv. An attacker could exploit this vulnerability by obtaining one of the SSH private keys and using it to impersonate or decrypt communication between any WSAv, ESAv, or SMAv. An exploit could allow the attacker to decrypt and impersonate secure communication between any virtual content security appliances. Cisco has confirmed the vulnerability in a security advisory and released software updates. To exploit this vulnerability, an attacker must first stage a man-in-the-middle attack between the targeted device and the host. This requirement may increase the difficulty of a successful exploit. A successful exploit of this vulnerability may allow the attacker to decrypt communication and access sensitive information, impersonate a targeted device and send modified data to a configured content appliance, or limit SSH access to any content appliance managed by the targeted device, which could be used to conduct further attacks. Only virtual WSA, ESA, and SMA appliances are affected by this vulnerability. Cisco WSA, Cisco ESA, and Cisco Content Security Management Appliance are not affected by this vulnerability. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-4217
Cisco Bug IDsCSCus29681, CSCuu95676, CSCuu96601, CSCuv13980
CVSS ScoreBase 5.8
Base 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco Content Security Management Virtual Appliance, Cisco Email Security Virtual Appliance, Cisco Web Security Virtual Appliance

Related Products

Product CVE Evidence
Cisco Web Security Virtual Appliance CVE-2015-4217 Cisco OpenVuln
Cisco Email Security Virtual Appliance CVE-2015-4217 Cisco OpenVuln
Cisco Content Security Management Virtual Appliance CVE-2015-4217 Cisco OpenVuln