CVE-2014-8779
Pexip Infinity before 8 uses the same SSH host keys across different customers’ installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.
Date published : 2015-02-03
http://www.securityfocus.com/bid/72359
http://www.securityfocus.com/archive/1/534576/100/0/threaded