2015-02-03 16:00:00
mitre
PUBLISHED
Pexip Infinity before 8 uses the same SSH host keys across different customers installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.