VulnerabilitiesHIGH

KVM Device Vulnerabilities - Remote Access Risks Exposed

🎯

Basically, cheap remote access devices have serious security flaws that can let hackers control your computers.

Quick Summary

Nine serious vulnerabilities have been found in low-cost KVM-over-IP devices. This could allow attackers remote access to critical systems. Businesses must act quickly to secure these devices and protect their networks.

The Flaw

Researchers have uncovered nine vulnerabilities in four popular low-cost KVM-over-IP devices. These devices allow remote control of computers, providing users with full keyboard, video, and mouse access, even at the BIOS level. The vulnerabilities range from unauthenticated command injection to weak authentication defenses and insecure firmware updates. The findings are alarming, especially as these devices are increasingly used in business environments, often without proper oversight.

The vulnerabilities affect devices from manufacturers like GL-iNet, Angeet/Yeeso, Sipeed, and JetKVM. The most critical flaw, rated 9.8 on the CVSS scale, allows attackers to write arbitrary files to the device. This can lead to remote code execution with root privileges. Such vulnerabilities are not just technical oversights; they represent fundamental security failures that could have severe implications for any network.

What's at Risk

The implications of these vulnerabilities are significant. A compromised KVM device can act as a backdoor to any connected system. Attackers can execute commands or manipulate UEFI settings to disable security features like disk encryption. Because these devices operate outside the controlled system's OS, traditional security measures like endpoint detection tools cannot detect them. This makes them particularly dangerous in environments where security is paramount, such as data centers, healthcare facilities, and government installations.

The number of exposed devices has surged from a few hundred to over 1,600 in less than a year, raising concerns about their widespread use in various sectors. The potential for misuse is vast, especially since these devices provide the equivalent of physical access to all connected machines.

Patch Status

Manufacturers are responding to these vulnerabilities, but the timelines for fixes vary. Angeet has committed to addressing the flaws but has not provided a specific timeline. GL-iNet has issued partial fixes in a beta release but lacks a plan for firmware signing or UART authentication. Meanwhile, JetKVM has patched its vulnerabilities, and Sipeed has resolved its unauthenticated WiFi configuration issue.

Despite these efforts, many devices remain vulnerable, and the lack of fundamental security controls raises concerns about the overall reliability of low-cost KVM solutions. As these devices become more integrated into business operations, the urgency for comprehensive security measures increases.

Immediate Actions

Organizations using KVM-over-IP devices should take immediate action to mitigate risks. Here are some recommended steps:

  • Isolate KVM devices on dedicated management VLANs.
  • Avoid exposing them directly to the internet.
  • Implement two-factor authentication where available.
  • Use VPN solutions to access these devices securely.
  • Audit your network for KVM devices and ensure they are running the latest firmware.

These devices can be the keys to your kingdom, and it’s crucial to know what you have, where it is, and what firmware it is running. The security of your network could depend on it.

🔒 Pro insight: The vulnerabilities mirror early IoT security failures, emphasizing the need for robust security measures in emerging technologies.

Original article from

CSO Online

Read Full Article

Related Pings

HIGHVulnerabilities

Vulnerabilities - CISA Adds SharePoint and Zimbra Bugs

CISA has added critical vulnerabilities in SharePoint and Zimbra to its exploited flaws list. These flaws allow for remote code execution and cross-site scripting. Organizations must act quickly to patch these vulnerabilities and protect their systems.

SC Media·
HIGHVulnerabilities

Ubuntu Desktop - Critical Root Privilege Escalation Flaw

A critical flaw in Ubuntu Desktop allows local attackers to gain root access. Versions 24.04 and later are affected, posing serious risks to system security. Immediate patching is essential to protect against potential exploits.

SC Media·
HIGHVulnerabilities

ScreenConnect Vulnerability - ConnectWise Issues Critical Alert

ConnectWise has warned of a critical vulnerability in ScreenConnect. This flaw could allow unauthorized access to remote systems. Users must upgrade immediately to protect their networks.

SC Media·
HIGHVulnerabilities

Vulnerabilities in IP KVM Devices - Significant Network Risks

Recent findings reveal critical vulnerabilities in IP KVM devices, exposing networks to severe risks. Attackers can gain root access and execute malicious code, threatening security. Immediate action is essential to mitigate these vulnerabilities.

SC Media·
CRITICALVulnerabilities

Ubiquiti UniFi Vulnerability - Critical Account Hijacking Risk

Ubiquiti has patched critical vulnerabilities in its UniFi Network app, allowing potential account hijacking. Users must update to secure their systems. This flaw poses serious risks to network security.

Security Affairs·
HIGHVulnerabilities

CVE-2025-32975 - Exploitation of Quest KACE Systems

Arctic Wolf has detected exploitation of a critical vulnerability in Quest KACE Systems Management Appliances. Unpatched systems are at risk of unauthorized access and administrative takeover. Organizations must act quickly to patch their systems and secure their environments.

Arctic Wolf Blog·