Vulnerability Name:

CVE-2015-4216 (CCN-104072)

Assigned:2015-06-25
Published:2015-06-25
Updated:2016-12-28
Summary:The remote-support feature on Cisco Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Security Management Virtual Appliance (SMAv) devices before 2015-06-25 uses the same default SSH root authorized key across different customers' installations, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of a private key from another installation, aka Bug IDs CSCuu95988, CSCuu95994, and CSCuu96630.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-200
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2015-4216

Source: CCN
Type: Cisco Security Advisory ID: cisco-sa-20150625-ironport
Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA

Source: CISCO
Type: Vendor Advisory
20150625 Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA

Source: BID
Type: Third Party Advisory, VDB Entry
75417

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1032725

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1032726

Source: XF
Type: UNKNOWN
cisco-virtual-cve20154216-priv-esc(104072)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cisco:content_security_management_virtual_appliance:8.4.0.0150:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:content_security_management_virtual_appliance:9.0.0.087:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:email_security_virtual_appliance:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:email_security_virtual_appliance:8.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:email_security_virtual_appliance:8.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:email_security_virtual_appliance:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:7.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:8.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_virtual_appliance:8.7.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:web_security_appliance_(wsa):5.6.0-623:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco content security management virtual appliance 8.4.0.0150
    cisco content security management virtual appliance 9.0.0.087
    cisco email security virtual appliance 8.0.0
    cisco email security virtual appliance 8.5.6
    cisco email security virtual appliance 8.5.7
    cisco email security virtual appliance 9.0.0
    cisco web security virtual appliance 7.7.5
    cisco web security virtual appliance 8.0.5
    cisco web security virtual appliance 8.5.0
    cisco web security virtual appliance 8.5.1
    cisco web security virtual appliance 8.6.0
    cisco web security virtual appliance 8.7.0
    cisco web security appliance (wsa) 5.6.0-623