Vulnerability Name: CVE-2015-4216 (CCN-104072) Assigned: 2015-06-25 Published: 2015-06-25 Updated: 2016-12-28 Summary: The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-200 Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2015-4216 Source: CCN Type: Cisco Security Advisory ID: cisco-sa-20150625-ironportMultiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA Source: CISCO Type: Vendor Advisory20150625 Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA Source: BID Type: Third Party Advisory, VDB Entry75417 Source: SECTRACK Type: Third Party Advisory, VDB Entry1032725 Source: SECTRACK Type: Third Party Advisory, VDB Entry1032726 Source: XF Type: UNKNOWNcisco-virtual-cve20154216-priv-esc(104072) Vulnerable Configuration: Configuration 1 :cpe:/a:cisco:content_security_management_virtual_appliance:8.4.0.0150:*:*:*:*:*:*:* OR cpe:/a:cisco:content_security_management_virtual_appliance:9.0.0.087:*:*:*:*:*:*:* OR cpe:/a:cisco:email_security_virtual_appliance:8.0.0:*:*:*:*:*:*:* OR cpe:/a:cisco:email_security_virtual_appliance:8.5.6:*:*:*:*:*:*:* OR cpe:/a:cisco:email_security_virtual_appliance:8.5.7:*:*:*:*:*:*:* OR cpe:/a:cisco:email_security_virtual_appliance:9.0.0:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:7.7.5:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:8.0.5:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:8.5.0:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:8.5.1:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:8.6.0:*:*:*:*:*:*:* OR cpe:/a:cisco:web_security_virtual_appliance:8.7.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:cisco:web_security_appliance_(wsa):5.6.0-623:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
cisco content security management virtual appliance 8.4.0.0150
cisco content security management virtual appliance 9.0.0.087
cisco email security virtual appliance 8.0.0
cisco email security virtual appliance 8.5.6
cisco email security virtual appliance 8.5.7
cisco email security virtual appliance 9.0.0
cisco web security virtual appliance 7.7.5
cisco web security virtual appliance 8.0.5
cisco web security virtual appliance 8.5.0
cisco web security virtual appliance 8.5.1
cisco web security virtual appliance 8.6.0
cisco web security virtual appliance 8.7.0
cisco web security appliance (wsa) 5.6.0-623