CVE-2014-8779

Publication date

2015-02-03 16:00:00

Family

mitre

State

PUBLISHED

Description

Pexip Infinity before 8 uses the same SSH host keys across different customers installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.