SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SM

by George Chetcuti [Published on 30 June 2015 / Last Updated on 30 June 2015]

A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user.

Cisco Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv) are affected by the following vulnerabilities:

  • Cisco Virtual WSA, ESA, and SMA Default Authorized SSH Key Vulnerability
  • Cisco Virtual WSA, ESA, and SMA Default SSH Host Keys Vulnerability

Cisco has released free software updates that address these vulnerabilities. There are no workarounds for these vulnerabilities.

Cisco advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150625-ironport

See Also


Review and Comments

See Also