Vulnerability Database

296,720

Total vulnerabilities in the database

CVE-2014-8779

Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.

  • Published: Feb 3, 2015
  • Updated: Apr 13, 2023
  • CVE: CVE-2014-8779
  • Severity: High
  • Exploit:

CVSS v2:

  • Severity: High
  • Score: 7.1
  • AV:N/AC:M/Au:N/C:N/I:C/A:N

CWEs: