CVE-2015-4216

The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
ciscoCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
VendorProductVersion
ciscocontent_security_management_virtual_appliance
8.4.0.0150
ciscocontent_security_management_virtual_appliance
9.0.0.087
ciscoemail_security_virtual_appliance
8.0.0
ciscoemail_security_virtual_appliance
8.5.6
ciscoemail_security_virtual_appliance
8.5.7
ciscoemail_security_virtual_appliance
9.0.0
ciscoweb_security_virtual_appliance
7.7.5
ciscoweb_security_virtual_appliance
8.0.5
ciscoweb_security_virtual_appliance
8.5.0
ciscoweb_security_virtual_appliance
8.5.1
ciscoweb_security_virtual_appliance
8.6.0
ciscoweb_security_virtual_appliance
8.7.0
𝑥
= Vulnerable software versions