According to its banner, the version of OpenSSL on the remote host is 1.0.2 prior to 1.0.2f and is affected by a flaw in the ‘DH_check_pub_key()’ function in ‘crypto/dh/dh_check.c’ that is triggered when generating DH parameters based on unsafe primes. By completing multiple handshakes with a peer, a remote attacker can potentially disclose the peer’s private DH exponent.
Binary data 9465.prm