$30 IP-KVM Flaws Could Give Attackers BIOS-Level Control Across Enterprise Networks

Related

Female Cybersecurity Leaders to Watch in Michigan

Michigan’s cybersecurity leadership bench runs deeper than a single...

$30 IP-KVM Flaws Could Give Attackers BIOS-Level Control Across Enterprise Networks

What happened Researchers at Eclypsium uncovered nine vulnerabilities across four...

Female CISOs to Watch in Illinois

Illinois is home to a cybersecurity leadership bench that...

FBI Warns of Handala Hackers Using Telegram in Malware Attacks

What happened The FBI issued a warning that Iran-linked hackers...

Female CISOs to Watch in Florida

Florida has quietly built one of the most dynamic...

Share

What happened

Researchers at Eclypsium uncovered nine vulnerabilities across four low-cost IP-KVM devices from GL-iNet, Angeet/Yeeso, Sipeed, and JetKVM, flaws that could give attackers BIOS-level control over connected systems and bypass operating system security controls and EDR tools. The most severe issues affect the Angeet/Yeeso ES3 KVM, where an unauthenticated file upload flaw (CVE-2026-32297) can be chained with an OS command injection bug (CVE-2026-32298) to achieve pre-authentication remote code execution with root privileges. The researchers also found weak firmware verification, exposed debug interfaces, broken access controls, and insufficient rate limiting across the affected products, while internet scans identified more than 1,600 of these devices exposed online. 

Who is affected

Organizations using the affected IP-KVM devices in enterprise, lab, or remote management environments are affected, particularly those with devices exposed directly to the internet or deployed without segmented management networks. 

Why CISOs should care

Because IP-KVM devices operate below the host operating system, compromise can give attackers the equivalent of physical access to connected machines, enabling BIOS changes, boot manipulation, and control that remains invisible to host-based security tools. 

3 practical actions

  1. Isolate IP-KVM devices on dedicated management networks. Systems should be placed on separate VLANs and never exposed directly to the internet. 
  2. Restrict access with strong authentication and VPNs. Administrative access should be tightly controlled to reduce exposure of out-of-band management systems. 
  3. Inventory devices and apply firmware updates. Review environments for undocumented KVM devices and update affected products when vendor patches are available. 

For more coverage of newly disclosed security flaws, explore our reporting under the Vulnerabilities tag.