Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nine IP KVM Flaws Risk Unauthorized Root Access

Nine IP KVM Flaws Risk Unauthorized Root Access

Posted on March 18, 2026 By CWS

Recent discoveries in the cybersecurity realm have highlighted serious vulnerabilities in low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, capable of granting unauthorized root access to attackers. These vulnerabilities, identified by researchers at Eclypsium, affect products from four vendors: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM.

Vulnerability Details and Impact

The most critical of these nine vulnerabilities could allow attackers to execute malicious code or gain root access without authentication. The issues identified include missing firmware signature validation, lack of brute-force protection, weak access controls, and exposed debug interfaces. Such flaws pose a significant threat as they enable remote control of a system’s keyboard, video, and mouse inputs at the BIOS/UEFI level.

The vulnerabilities, classified with varying CVSS scores, range from insufficient firmware authenticity checks (CVE-2026-32290) to command injection vulnerabilities (CVE-2026-32298) that allow arbitrary command execution. Some of these issues have been addressed in recent updates, while others remain unresolved, posing ongoing risks to system security.

Historical Context and Comparison

This is not an isolated incident, as similar vulnerabilities have been observed in the past with other IP KVM devices. For instance, Russian cybersecurity firm Positive Technologies reported similar flaws in ATEN International switches in mid-2025, which could facilitate remote code execution or denial-of-service attacks.

Additionally, IP KVM devices like PiKVM and TinyPilot have been used by North Korean IT workers to remotely operate company laptops, highlighting the potential for misuse in various geopolitical contexts.

Mitigation Strategies and Security Recommendations

To mitigate these risks, experts recommend implementing multi-factor authentication (MFA) where possible, isolating KVM devices on dedicated management VLANs, restricting Internet access, and using tools such as Shodan to detect external exposure. Regular monitoring for unusual network activity and ensuring firmware is up-to-date are also advised.

Eclypsium emphasizes that compromised KVM devices offer a silent, direct path to affected systems, allowing attackers to hide malware and backdoors, which can persist even after remediation. The lack of signature verification in firmware updates further exacerbates the risk, as supply-chain attacks could alter firmware during distribution.

While the vulnerabilities present significant challenges, awareness and proactive measures can help mitigate potential threats, safeguarding systems against unauthorized access and control.

The Hacker News Tags:Authentication, Cybersecurity, Eclypsium, Firmware, IP KVM, network security, remote access, root access, security flaws, Vulnerability

Post navigation

Previous Post: ForceMemo Malware Compromises GitHub Python Repositories
Next Post: AI in SaaS: Uncovering Hidden Risks and Security Challenges

Related Posts

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News
Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT The Hacker News
ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs The Hacker News
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark