Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nine IP KVM Flaws Risk Unauthorized Root Access

Nine IP KVM Flaws Risk Unauthorized Root Access

Posted on March 18, 2026 By CWS

Recent discoveries in the cybersecurity realm have highlighted serious vulnerabilities in low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, capable of granting unauthorized root access to attackers. These vulnerabilities, identified by researchers at Eclypsium, affect products from four vendors: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM.

Vulnerability Details and Impact

The most critical of these nine vulnerabilities could allow attackers to execute malicious code or gain root access without authentication. The issues identified include missing firmware signature validation, lack of brute-force protection, weak access controls, and exposed debug interfaces. Such flaws pose a significant threat as they enable remote control of a system’s keyboard, video, and mouse inputs at the BIOS/UEFI level.

The vulnerabilities, classified with varying CVSS scores, range from insufficient firmware authenticity checks (CVE-2026-32290) to command injection vulnerabilities (CVE-2026-32298) that allow arbitrary command execution. Some of these issues have been addressed in recent updates, while others remain unresolved, posing ongoing risks to system security.

Historical Context and Comparison

This is not an isolated incident, as similar vulnerabilities have been observed in the past with other IP KVM devices. For instance, Russian cybersecurity firm Positive Technologies reported similar flaws in ATEN International switches in mid-2025, which could facilitate remote code execution or denial-of-service attacks.

Additionally, IP KVM devices like PiKVM and TinyPilot have been used by North Korean IT workers to remotely operate company laptops, highlighting the potential for misuse in various geopolitical contexts.

Mitigation Strategies and Security Recommendations

To mitigate these risks, experts recommend implementing multi-factor authentication (MFA) where possible, isolating KVM devices on dedicated management VLANs, restricting Internet access, and using tools such as Shodan to detect external exposure. Regular monitoring for unusual network activity and ensuring firmware is up-to-date are also advised.

Eclypsium emphasizes that compromised KVM devices offer a silent, direct path to affected systems, allowing attackers to hide malware and backdoors, which can persist even after remediation. The lack of signature verification in firmware updates further exacerbates the risk, as supply-chain attacks could alter firmware during distribution.

While the vulnerabilities present significant challenges, awareness and proactive measures can help mitigate potential threats, safeguarding systems against unauthorized access and control.

The Hacker News Tags:Authentication, Cybersecurity, Eclypsium, Firmware, IP KVM, network security, remote access, root access, security flaws, Vulnerability

Post navigation

Previous Post: ForceMemo Malware Compromises GitHub Python Repositories
Next Post: AI in SaaS: Uncovering Hidden Risks and Security Challenges

Related Posts

Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager The Hacker News
Emerging Cyber Threats: OAuth Abuse and Beyond Emerging Cyber Threats: OAuth Abuse and Beyond The Hacker News
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora The Hacker News
AI Tool CyberStrikeAI Powers Global FortiGate Attacks AI Tool CyberStrikeAI Powers Global FortiGate Attacks The Hacker News
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges
  • Nine IP KVM Flaws Risk Unauthorized Root Access
  • ForceMemo Malware Compromises GitHub Python Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges
  • Nine IP KVM Flaws Risk Unauthorized Root Access
  • ForceMemo Malware Compromises GitHub Python Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark