Cisco TelePresence Video Communication Server Expressway Default SSL Certificate

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote service is using a well-known SSL certificate whose private
key has been published.

Description :

The X.509 certificate of the remote host is known to ship by default
with the remote service / device. The private key for this cert has
been published, therefore the SSL communications done with the remote
host cannot be considered secret as anyone with the ability to snoop the
traffic between the remote host and the clients could decipher the
traffic or launch a man-in-the-middle attack.

See also :

http://www.nessus.org/u?bccf389b
http://tools.cisco.com/security/center/viewAlert.x?alertId=32540

Solution :

Purchase or generate a proper certificate for this service and replace
it, or ask your vendor for a way to do so.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.6
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: CISCO

Nessus Plugin ID: 72245 ()

Bugtraq ID: 65101

CVE ID: CVE-2014-0675