CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Unauthenticated Root Access Flaws Disclosed in Multiple IP KVM Vendors

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Nine vulnerabilities across IP KVM devices from four vendors enable unauthenticated attackers to gain root access, execute arbitrary code, or bypass security controls, posing critical risks to connected systems. The flaws span GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM, with the most severe allowing unauthenticated root access or arbitrary code execution. Exploitation can undermine Secure Boot, disk encryption, and operating system-level security measures, granting persistent, undetected access to compromised hosts. Researchers highlight systemic issues including missing firmware signature validation, absent authentication, and exposed debug interfaces as recurring themes.

Timeline

  1. 18.03.2026 13:42 1 articles · 3h ago

    Critical IP KVM Flaws Enable Unauthenticated Root Access and Persistent Compromise

    Nine vulnerabilities across IP KVM devices from GL-iNet, Angeet/Yeeso, Sipeed, and JetKVM allow unauthenticated attackers to gain root access, execute arbitrary code, and bypass security controls. Exploitation can undermine Secure Boot, disk encryption, and OS-level protections, enabling persistent, undetected access to compromised hosts. Flaws include missing firmware signature validation, absent authentication mechanisms, and exposed debug interfaces, with some vendors (e.g., Angeet ES3 KVM) remaining unpatched. Mitigations include MFA enforcement, network isolation, firmware updates, and monitoring for unexpected device traffic.

    Show sources

Information Snippets