AirScan in Apple OS X before 10.11 allows man-in-the-middle attackers to obtain eSCL packet payload data via unspecified vectors.
https://support.apple.com/HT205267
http://www.securitytracker.com/id/1033703
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html