Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nine IP KVM Flaws Risk Unauthorized Root Access

Nine IP KVM Flaws Risk Unauthorized Root Access

Posted on March 18, 2026 By CWS

Recent discoveries in the cybersecurity realm have highlighted serious vulnerabilities in low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, capable of granting unauthorized root access to attackers. These vulnerabilities, identified by researchers at Eclypsium, affect products from four vendors: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM.

Vulnerability Details and Impact

The most critical of these nine vulnerabilities could allow attackers to execute malicious code or gain root access without authentication. The issues identified include missing firmware signature validation, lack of brute-force protection, weak access controls, and exposed debug interfaces. Such flaws pose a significant threat as they enable remote control of a system’s keyboard, video, and mouse inputs at the BIOS/UEFI level.

The vulnerabilities, classified with varying CVSS scores, range from insufficient firmware authenticity checks (CVE-2026-32290) to command injection vulnerabilities (CVE-2026-32298) that allow arbitrary command execution. Some of these issues have been addressed in recent updates, while others remain unresolved, posing ongoing risks to system security.

Historical Context and Comparison

This is not an isolated incident, as similar vulnerabilities have been observed in the past with other IP KVM devices. For instance, Russian cybersecurity firm Positive Technologies reported similar flaws in ATEN International switches in mid-2025, which could facilitate remote code execution or denial-of-service attacks.

Additionally, IP KVM devices like PiKVM and TinyPilot have been used by North Korean IT workers to remotely operate company laptops, highlighting the potential for misuse in various geopolitical contexts.

Mitigation Strategies and Security Recommendations

To mitigate these risks, experts recommend implementing multi-factor authentication (MFA) where possible, isolating KVM devices on dedicated management VLANs, restricting Internet access, and using tools such as Shodan to detect external exposure. Regular monitoring for unusual network activity and ensuring firmware is up-to-date are also advised.

Eclypsium emphasizes that compromised KVM devices offer a silent, direct path to affected systems, allowing attackers to hide malware and backdoors, which can persist even after remediation. The lack of signature verification in firmware updates further exacerbates the risk, as supply-chain attacks could alter firmware during distribution.

While the vulnerabilities present significant challenges, awareness and proactive measures can help mitigate potential threats, safeguarding systems against unauthorized access and control.

The Hacker News Tags:Authentication, Cybersecurity, Eclypsium, Firmware, IP KVM, network security, remote access, root access, security flaws, Vulnerability

Post navigation

Previous Post: ForceMemo Malware Compromises GitHub Python Repositories
Next Post: AI in SaaS: Uncovering Hidden Risks and Security Challenges

Related Posts

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods The Hacker News
Ex-Defense Employee Sentenced for Selling Zero-Day Exploits Ex-Defense Employee Sentenced for Selling Zero-Day Exploits The Hacker News
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Native Emerges with $42M to Enhance Cloud Security
  • Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining
  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Native Emerges with $42M to Enhance Cloud Security
  • Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining
  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark