VAR-200905-0263

Vulnerability from variot - Updated: 2023-12-18 12:31

The ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not (1) encrypt mouse events, which makes it easier for man-in-the-middle attackers to perform mouse operations on machines connected to the switch by injecting network traffic; and do not (2) set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Multiple ATEN IP KVM switches are prone to multiple remote vulnerabilities and a weakness: - A security weakness may allow attackers to decrypt HTTP traffic. - A remote code-execution vulnerability is present. - A security vulnerability may allow attackers to gain access to the session key. - A security vulnerability may allow attackers to gain access to mouse events. - A security vulnerability may allow attackers to gain access to the session ID. Attackers can exploit these issues to execute Java code, compromise and gain unauthorized access to the affected device connected to the KVM, gain access to the session key, and gain access to the session ID. Other attacks are also possible. IP KVM is a series of switch equipment developed by Taiwan Acer Technology Co., Ltd. Insecure session ID cookie When a user connects to the device via HTTP on port 80, the device redirects the user to log in on port 443 (https) and obtains a session ID cookie. When the user returns to HTTP for various reasons, the attacker can sniff the session ID and use this to download the Windows/Java client program containing authentication data, and obtain Access to computers connected to the KVM switch. Since the first HTTP connection is not protected, a man-in-the-middle attacker can also inject some dynamic content so that the browser automatically reloads the HTTP site after login. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: ATEN KH1516i / KN9116 Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA35241

VERIFY ADVISORY: http://secunia.com/advisories/35241/

DESCRIPTION: Some vulnerabilities have been reported in ATEN KH1516i and KN9116, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, and potentially compromise a user's system.

1) An error exists in the key exchange process when negotiating a symmetric session key via RSA. This can be exploited extract the session key by intercepting traffic and e.g. potentially execute arbitrary code on connected machines via MitM (Man-in-the-Middle) attacks.

2) Mouse events are transferred between a client and the KVM switch via an unencrypted data channel. This can be exploited to inject e.g. arbitrary mouse clicks via MitM (Man-in-the-Middle) attacks.

3) The web interface session cookie does not contain the "Secure" attribute. This can be exploited to obtain the cookie and potentially gain access to connected machines by redirecting the user's browser to a HTTP connection.

The vulnerabilities are reported in KH1516i and KN9116. Other products may also be affected.

SOLUTION: Use the products in trusted networks only.

PROVIDED AND/OR DISCOVERED BY: Jakob Lell from the TU Berlin computer security working group


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0263",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "kh1516i ip kvm switch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "aten",
        "version": "1.0.063"
      },
      {
        "model": "kn9116 ip kvm switch",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "aten",
        "version": "1.1.104"
      },
      {
        "model": "kh1516i ip kvm switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "aten",
        "version": "firmware 1.0.063"
      },
      {
        "model": "kn9116 ip kvm switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "aten",
        "version": "firmware 1.1.104"
      },
      {
        "model": "ip kvm pn9108",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "aten",
        "version": "0"
      },
      {
        "model": "ip kvm kn9116",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "aten",
        "version": "1.1.1.014"
      },
      {
        "model": "ip kvm kh1516i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "aten",
        "version": "1.0.063"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "35108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:aten:kh1516i_ip_kvm_switch:1.0.063:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:aten:kn9116_ip_kvm_switch:1.1.104:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jakob Lell  jakob@cs.tu-berlin.de",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-1474",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2009-1474",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 4.9,
            "id": "VHN-38920",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2009-1474",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-309",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-38920",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not (1) encrypt mouse events, which makes it easier for man-in-the-middle attackers to perform mouse operations on machines connected to the switch by injecting network traffic; and do not (2) set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Multiple ATEN IP KVM switches are prone to multiple remote vulnerabilities and a weakness:\n- A security weakness may allow attackers to decrypt HTTP traffic. \n- A remote code-execution vulnerability is present. \n- A security vulnerability may allow attackers to gain access to the session key. \n- A security vulnerability may allow attackers to gain access to mouse events. \n- A security vulnerability may allow attackers to gain access to the session ID. \nAttackers can exploit these issues to execute Java code, compromise and gain unauthorized access to the affected device  connected to the KVM, gain access to the session key, and gain access to the session ID. Other attacks are also possible. IP KVM is a series of switch equipment developed by Taiwan Acer Technology Co., Ltd. Insecure session ID cookie When a user connects to the device via HTTP on port 80, the device redirects the user to log in on port 443 (https) and obtains a session ID cookie. When the user returns to HTTP for various reasons, the attacker can sniff the session ID and use this to download the Windows/Java client program containing authentication data, and obtain Access to computers connected to the KVM switch. Since the first HTTP connection is not protected, a man-in-the-middle attacker can also inject some dynamic content so that the browser automatically reloads the HTTP site after login. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nATEN KH1516i / KN9116 Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA35241\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/35241/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in ATEN KH1516i and KN9116,\nwhich can be exploited by malicious people to disclose sensitive\ninformation, manipulate certain data, and potentially compromise a\nuser\u0027s system. \n\n1) An error exists in the key exchange process when negotiating a\nsymmetric session key via RSA. This can be exploited extract the\nsession key by intercepting traffic and e.g. potentially execute\narbitrary code on connected machines via MitM (Man-in-the-Middle)\nattacks. \n\n2) Mouse events are transferred between a client and the KVM switch\nvia an unencrypted data channel. This can be exploited to inject e.g. \narbitrary mouse clicks via MitM (Man-in-the-Middle) attacks. \n\n3) The web interface session cookie does not contain the \"Secure\"\nattribute. This can be exploited to obtain the cookie and potentially\ngain access to connected machines by redirecting the user\u0027s browser to\na HTTP connection. \n\nThe vulnerabilities are reported in KH1516i and KN9116. Other\nproducts may also be affected. \n\nSOLUTION:\nUse the products in trusted networks only. \n\nPROVIDED AND/OR DISCOVERED BY:\nJakob Lell from the TU Berlin computer security working group\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "BID",
        "id": "35108"
      },
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "PACKETSTORM",
        "id": "78429"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1474",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "35108",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "35241",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "50850",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20090526 MULTIPLE VULNERABILITIES IN SEVERAL ATEN IP KVM SWITCHES",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-38920",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "78429",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "BID",
        "id": "35108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "PACKETSTORM",
        "id": "78429"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "id": "VAR-200905-0263",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:31:46.022000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.aten.com/ip-kvm.htm"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/35108"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/35241"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/503827/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50850"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1474"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1474"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/50850"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/503827/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "http://www.aten.com/ip-kvm.htm"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/503827"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/35241/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "BID",
        "id": "35108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "PACKETSTORM",
        "id": "78429"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "db": "BID",
        "id": "35108"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "db": "PACKETSTORM",
        "id": "78429"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-05-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "date": "2009-05-26T00:00:00",
        "db": "BID",
        "id": "35108"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "date": "2009-06-16T07:05:06",
        "db": "PACKETSTORM",
        "id": "78429"
      },
      {
        "date": "2009-05-27T16:30:01.813000",
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "date": "2009-05-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-38920"
      },
      {
        "date": "2009-05-27T00:10:00",
        "db": "BID",
        "id": "35108"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      },
      {
        "date": "2018-10-10T19:37:03.937000",
        "db": "NVD",
        "id": "CVE-2009-1474"
      },
      {
        "date": "2009-06-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ATEN KH1516i IP KVM Cookie acquisition vulnerability in Switch",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003376"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-309"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…