At the moment an intercepting MITM could manipulate the RSA key exchange to gain full control of the traffic (both client ---(evil)---> server and client ---> server (evil) ---> client), fully breaking the encryption. Further problems listed below...
At the moment an intercepting MITM could manipulate the RSA key exchange to gain full control of the traffic (both client ---(evil)---> server and client ---> server (evil) ---> client), fully breaking the encryption. Further problems listed below...