aten CVE Vulnerabilities & Metrics

Focus on aten vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About aten Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with aten. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total aten CVEs: 9
Earliest CVE date: 27 May 2009, 16:30 UTC
Latest CVE date: 02 Sep 2025, 20:15 UTC

Latest CVE reference: CVE-2025-6685

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -50.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical aten CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.24

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 0
7.0-8.9 2
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS aten CVEs

These are the five CVEs with the highest CVSS scores for aten, sorted by severity first and recency.

All CVEs for aten

CVE-2025-6685 aten vulnerability CVSS: 0 02 Sep 2025, 20:15 UTC

ATEN eco DC Missing Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of ATEN eco DC. Authentication is required to exploit this vulnerability. The specific flaw exists within the web-based interface. The issue results from the lack of validating the assigned user role when handling requests. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-26647.

CVE-2023-43843 aten vulnerability CVSS: 0 28 May 2024, 19:15 UTC

Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to read user and administrator accounts passwords via HTTP GET request.

CVE-2023-43842 aten vulnerability CVSS: 0 28 May 2024, 19:15 UTC

Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter user and administrator accounts credentials via HTTP POST request.

CVE-2023-25415 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. The device allows unauthenticated access to Event Notification configuration.

CVE-2023-25414 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to denial of service (DOS).

CVE-2023-25413 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. The device allows unauthenticated access to Telnet and SNMP credentials.

CVE-2023-25411 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to Cross Site Request Forgery (CSRF).

CVE-2023-25409 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have access to other users outlets.

CVE-2023-25407 aten vulnerability CVSS: 0 11 Apr 2023, 21:15 UTC

Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have read access to administrator credentials.

CVE-2014-1997 aten vulnerability CVSS: 7.8 05 Jun 2014, 17:55 UTC

The ATEN CN8000 remote-access unit with firmware 1.6.154 and earlier allows remote attackers to cause a denial of service via unspecified vectors.

CVE-2009-1477 aten vulnerability CVSS: 10.0 27 May 2009, 16:30 UTC

The https web interfaces on the ATEN KH1516i IP KVM switch with firmware 1.0.063, the KN9116 IP KVM switch with firmware 1.1.104, and the PN9108 power-control unit have a hardcoded SSL private key, which makes it easier for remote attackers to decrypt https sessions by extracting this key from their own switch and then sniffing network traffic to a switch owned by a different customer.

CVE-2009-1474 aten vulnerability CVSS: 7.6 27 May 2009, 16:30 UTC

The ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not (1) encrypt mouse events, which makes it easier for man-in-the-middle attackers to perform mouse operations on machines connected to the switch by injecting network traffic; and do not (2) set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

CVE-2009-1473 aten vulnerability CVSS: 10.0 27 May 2009, 16:30 UTC

The (1) Windows and (2) Java client programs for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 do not properly use RSA cryptography for a symmetric session-key negotiation, which makes it easier for remote attackers to (a) decrypt network traffic, or (b) conduct man-in-the-middle attacks, by repeating unspecified "client-side calculations."

CVE-2009-1472 aten vulnerability CVSS: 10.0 27 May 2009, 16:30 UTC

The Java client program for the ATEN KH1516i IP KVM switch with firmware 1.0.063 and the KN9116 IP KVM switch with firmware 1.1.104 has a hardcoded AES encryption key, which makes it easier for man-in-the-middle attackers to (1) execute arbitrary Java code, or (2) gain access to machines connected to the switch, by hijacking a session.