Aten

Kh1516i Ip Kvm Switch

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 27.05.2009 16:30:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Java client program for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 has a hardcoded AES encryption key, which makes it easier for man-in-the-middle attackers to (1) execute arbitrary Jav...

  • EPSS 0.94%
  • Veröffentlicht 27.05.2009 16:30:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The (1) Windows and (2) Java client programs for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not properly use RSA cryptography for a symmetric session-key negotiation, which makes it easi...

  • EPSS 0.84%
  • Veröffentlicht 27.05.2009 16:30:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not (1) encrypt mouse events, which makes it easier for man-in-the-middle attackers to perform mouse operations on machines connected to the sw...

  • EPSS 0.73%
  • Veröffentlicht 27.05.2009 16:30:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The https web interfaces on the ATEN KH1516i IP KVM switch with firmware 1.0.063, the KN9116 IP KVM switch with firmware 1.1.104, and the PN9108 power-control unit have a hardcoded SSL private key, which makes it easier for remote attackers to decryp...