Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

IP KVM Flaws Hit Four Manufacturers

Image © Arstechnica
Security researchers warn that inexpensive IP KVMs that offer BIOS-level access can become a backdoor when improperly secured or exposed to the Internet.

IP KVMs are compact, cost-effective devices that admins use to remotely reach servers. When connected, they grant access at the BIOS/UEFI stage, a level of control that can translate into far-reaching power over a machine and, by extension, the network it supports.

Researchers disclosed nine vulnerabilities across IP KVMs from four manufacturers. The most serious flaws could let attackers gain root access or run malicious code even without authentication, underscoring the risk of devices that bypass normal host defenses.

These flaws are not exotic zero-days. Instead, Eclypsium describes them as fundamental security gaps—lapses in input validation, authentication, cryptographic verification, and rate limiting—that resemble early IoT flaws but now sit on devices that can provide physical-like access to connected systems.

The researchers note that some of the affected products have partial or no fixes yet, including certain Angeet/Yeeso IP KVM models, leaving networks exposed while other vendors implement patches or beta updates. The report emphasizes that no single device type should be trusted to the extent BIOS-level access implies unless properly secured.

To mitigate risk, analysts urge network operators to scan for IP KVMs, enforce strong passwords, and route management traffic through trusted VPNs such as WireGuard or Tailscale. RunZero and Eclypsium recommend continuous inventory of these devices and applying strong access controls to reduce the chance of compromise.

 

Arstechnica

Related News

Astound Names Ettienne Brandt CEO
AT&T commits $250B to boost US connectivity
Denied in DC: BEAD funds blocked
Louisiana Advances BEAD Projects into Construction
Invisible Unicode Malware Hits GitHub and Repositories
Greenlight expands fiber builds NE Pennsylvania

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more