Vulnerabilities > CVE-2014-8779 - 7PK - Security Features vulnerability in Pexip Infinity 7.0
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
NONE Integrity impact
COMPLETE Availability impact
NONE Summary
Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |