Vulnerabilities > CVE-2014-8779 - 7PK - Security Features vulnerability in Pexip Infinity 7.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |