J-Security Center

Title: Multiple ATEN IP KVM Switches Multiple Remote Vulnerabilities and Weakness

Severity: CRITICAL

Description:

Multiple ATEN IP KVM switches are prone to multiple remote vulnerabilities and a weakness:

1. A security weakness may allow attackers to decrypt HTTP traffic. Specifically, all devices use the same SSL key for the HTTP web interface. An attacker with access to the SSL key for one device can decrypt network traffic sent from other devices. This issue is tracked by CVE-2009-1447 and affects ATEN KH1516i IP KVM Switch firmware 1.0.063, ATEN KN9116 firmware 1.1.104, and ATEN PN9108.

2. A remote code-execution vulnerability occurs in the Java client program. Specifically, the AES encryption key is hardcoded in the Java application. An attacker can exploit this issue by performing a man-in-the-middle attack with the AES key and then injecting arbitrary Java code onto the client's computer. The attacker may also gain access to machines connected to the KVM. This issue is tracked by CVE-2009-1472 and affects ATEN KH1516i IP KVM Switch firmware 1.0.063 and ATEN KN9116 firmware 1.1.104.

3. A security vulnerability may allow attackers to gain access to the session key. This issue occurs because the KVM switch and the client negotiates a symmetric session key in an insecure manner. An attacker who can monitor traffic can access the session key and then decrypt and reconstruct keystrokes. This issue is being tracked by CVE-2009-1473 and affects ATEN KH1516i IP KVM Switch firmware 1.0.063 and ATEN KN9116 firmware 1.1.104.

4. A security vulnerability may allow attackers to gain access to mouse events. This issue occurs because vulnerable devices do not encrypt mouse events. An attacker can exploit this issue to inject arbitrary mouse movements and mouse presses. Successfully exploiting this issue will compromise affected computers connected to the KVM device. This issue is tracked by CVE-2009-1474 and affects ATEN KH1516i IP KVM Switch firmware 1.0.063 and ATEN KN9116 firmware 1.1.104.

5. A security vulnerability may allow attackers to gain access to a session ID cookie. Specifically, devices do not use the 'secure' option for session cookies. This may allow attackers to gain access to the session ID cookie. Successfully exploiting this issue may allow attackers to inject dynamic content into the browser. This issue affects ATEN KH1516i IP KVM Switch firmware 1.0.063 and ATEN KN9116 firmware 1.1.104.

Attackers can exploit these issues to execute Java code, compromise and gain unauthorized access to the affected device connected to the KVM, gain access to the session key, and gain access to the session ID. Other attacks are also possible.

Affected Products:

  • ATEN IP KVM KH1516i 1.0.063
  • ATEN IP KVM KN9116 1.1.1.014
  • ATEN IP KVM PN9108

References:

Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.