ID

VAR-200905-0263


CVE

CVE-2009-1474


TITLE

ATEN KH1516i IP KVM Cookie acquisition vulnerability in Switch

Trust: 0.8

sources: JVNDB: JVNDB-2009-003376

DESCRIPTION

The ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not (1) encrypt mouse events, which makes it easier for man-in-the-middle attackers to perform mouse operations on machines connected to the switch by injecting network traffic; and do not (2) set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Multiple ATEN IP KVM switches are prone to multiple remote vulnerabilities and a weakness: - A security weakness may allow attackers to decrypt HTTP traffic. - A remote code-execution vulnerability is present. - A security vulnerability may allow attackers to gain access to the session key. - A security vulnerability may allow attackers to gain access to mouse events. - A security vulnerability may allow attackers to gain access to the session ID. Attackers can exploit these issues to execute Java code, compromise and gain unauthorized access to the affected device connected to the KVM, gain access to the session key, and gain access to the session ID. Other attacks are also possible. IP KVM is a series of switch equipment developed by Taiwan Acer Technology Co., Ltd. Insecure session ID cookie When a user connects to the device via HTTP on port 80, the device redirects the user to log in on port 443 (https) and obtains a session ID cookie. When the user returns to HTTP for various reasons, the attacker can sniff the session ID and use this to download the Windows/Java client program containing authentication data, and obtain Access to computers connected to the KVM switch. Since the first HTTP connection is not protected, a man-in-the-middle attacker can also inject some dynamic content so that the browser automatically reloads the HTTP site after login. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: ATEN KH1516i / KN9116 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35241 VERIFY ADVISORY: http://secunia.com/advisories/35241/ DESCRIPTION: Some vulnerabilities have been reported in ATEN KH1516i and KN9116, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, and potentially compromise a user's system. 1) An error exists in the key exchange process when negotiating a symmetric session key via RSA. This can be exploited extract the session key by intercepting traffic and e.g. potentially execute arbitrary code on connected machines via MitM (Man-in-the-Middle) attacks. 2) Mouse events are transferred between a client and the KVM switch via an unencrypted data channel. This can be exploited to inject e.g. arbitrary mouse clicks via MitM (Man-in-the-Middle) attacks. 3) The web interface session cookie does not contain the "Secure" attribute. This can be exploited to obtain the cookie and potentially gain access to connected machines by redirecting the user's browser to a HTTP connection. The vulnerabilities are reported in KH1516i and KN9116. Other products may also be affected. SOLUTION: Use the products in trusted networks only. PROVIDED AND/OR DISCOVERED BY: Jakob Lell from the TU Berlin computer security working group ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-1474 // JVNDB: JVNDB-2009-003376 // BID: 35108 // VULHUB: VHN-38920 // PACKETSTORM: 78429

AFFECTED PRODUCTS

vendor:atenmodel:kn9116 ip kvm switchscope:eqversion:1.1.104

Trust: 1.6

vendor:atenmodel:kh1516i ip kvm switchscope:eqversion:1.0.063

Trust: 1.6

vendor:atenmodel:kh1516i ip kvm switchscope:eqversion:firmware 1.0.063

Trust: 0.8

vendor:atenmodel:kn9116 ip kvm switchscope:eqversion:firmware 1.1.104

Trust: 0.8

vendor:atenmodel:ip kvm pn9108scope:eqversion:0

Trust: 0.3

vendor:atenmodel:ip kvm kn9116scope:eqversion:1.1.1.014

Trust: 0.3

vendor:atenmodel:ip kvm kh1516iscope:eqversion:1.0.063

Trust: 0.3

sources: BID: 35108 // JVNDB: JVNDB-2009-003376 // CNNVD: CNNVD-200905-309 // NVD: CVE-2009-1474

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1474
value: HIGH

Trust: 1.0

NVD: CVE-2009-1474
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200905-309
value: HIGH

Trust: 0.6

VULHUB: VHN-38920
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1474
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38920
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38920 // JVNDB: JVNDB-2009-003376 // CNNVD: CNNVD-200905-309 // NVD: CVE-2009-1474

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-38920 // JVNDB: JVNDB-2009-003376 // NVD: CVE-2009-1474

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200905-309

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-200905-309

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003376

PATCH

title:Top Pageurl:http://www.aten.com/IP-KVM.htm

Trust: 0.8

sources: JVNDB: JVNDB-2009-003376

EXTERNAL IDS

db:NVDid:CVE-2009-1474

Trust: 2.8

db:BIDid:35108

Trust: 2.0

db:SECUNIAid:35241

Trust: 1.8

db:JVNDBid:JVNDB-2009-003376

Trust: 0.8

db:XFid:50850

Trust: 0.6

db:BUGTRAQid:20090526 MULTIPLE VULNERABILITIES IN SEVERAL ATEN IP KVM SWITCHES

Trust: 0.6

db:CNNVDid:CNNVD-200905-309

Trust: 0.6

db:VULHUBid:VHN-38920

Trust: 0.1

db:PACKETSTORMid:78429

Trust: 0.1

sources: VULHUB: VHN-38920 // BID: 35108 // JVNDB: JVNDB-2009-003376 // PACKETSTORM: 78429 // CNNVD: CNNVD-200905-309 // NVD: CVE-2009-1474

REFERENCES

url:http://www.securityfocus.com/bid/35108

Trust: 1.7

url:http://secunia.com/advisories/35241

Trust: 1.7

url:http://www.securityfocus.com/archive/1/503827/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50850

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1474

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1474

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/50850

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/503827/100/0/threaded

Trust: 0.6

url:http://www.aten.com/ip-kvm.htm

Trust: 0.3

url:/archive/1/503827

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/35241/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-38920 // BID: 35108 // JVNDB: JVNDB-2009-003376 // PACKETSTORM: 78429 // CNNVD: CNNVD-200905-309 // NVD: CVE-2009-1474

CREDITS

Jakob Lell jakob@cs.tu-berlin.de

Trust: 0.6

sources: CNNVD: CNNVD-200905-309

SOURCES

db:VULHUBid:VHN-38920
db:BIDid:35108
db:JVNDBid:JVNDB-2009-003376
db:PACKETSTORMid:78429
db:CNNVDid:CNNVD-200905-309
db:NVDid:CVE-2009-1474

LAST UPDATE DATE

2025-04-10T23:05:08.838000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38920date:2018-10-10T00:00:00
db:BIDid:35108date:2009-05-27T00:10:00
db:JVNDBid:JVNDB-2009-003376date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-309date:2009-06-20T00:00:00
db:NVDid:CVE-2009-1474date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-38920date:2009-05-27T00:00:00
db:BIDid:35108date:2009-05-26T00:00:00
db:JVNDBid:JVNDB-2009-003376date:2012-06-26T00:00:00
db:PACKETSTORMid:78429date:2009-06-16T07:05:06
db:CNNVDid:CNNVD-200905-309date:2009-05-27T00:00:00
db:NVDid:CVE-2009-1474date:2009-05-27T16:30:01.813