Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
| Software | From | Fixed in |
|---|---|---|
| pexip / pexip_infinity | - | 7.0.x |