Pexip Infinity before 8 uses the same SSH host keys across different customers installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pexip_infinity | Pexip | * | 7.0 (including) |