Description
The (1) Windows and (2) Java client programs for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not properly use RSA cryptography for a symmetric session-key negotiation, which makes it easier for remote attackers to (a) decrypt network traffic, or (b) conduct man-in-the-middle attacks, by repeating unspecified "client-side calculations."
Published: 2009-05-27
Score: 10.0 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2009-1471 The (1) Windows and (2) Java client programs for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not properly use RSA cryptography for a symmetric session-key negotiation, which makes it easier for remote attackers to (a) decrypt network traffic, or (b) conduct man-in-the-middle attacks, by repeating unspecified "client-side calculations."
History

No history.

Subscriptions

Aten Kh1516i Ip Kvm Switch Kn9116 Ip Kvm Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T05:13:25.598Z

Reserved: 2009-04-28T00:00:00.000Z

Link: CVE-2009-1473

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-05-27T16:30:01.797

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-1473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses