CVE-2014-8779
03.02.2015, 16:59
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.Enginsight
Vendor | Product | Version |
---|---|---|
pexip | pexip_infinity | 𝑥 ≤ 7.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References