These devices, often priced between $30 and $100, are increasingly used for remote system management but are now being weaponized by attackers to gain deep, hardware-level access.
Unlike traditional software attacks, IP-KVM compromises operate below the operating system. This gives attackers direct control over a system’s keyboard, display, and mouse functions at the BIOS level.
As a result, they can bypass endpoint security tools, antivirus software, and host-based firewalls entirely.
A single compromised KVM device can provide full control over every connected machine. Attackers can execute commands, modify boot processes, deploy ransomware, or even mount attacks using virtual media without detection.
According to Eclypsium, internet-exposed IP-KVM devices have surged dramatically from 404 in June 2025 to over 1,600 by January 2026. This sharp increase highlights widespread adoption without adequate security controls.
The vulnerabilities stem from fundamental security failures in device design and implementation. Common issues include:
Because these devices run embedded Linux systems, attackers can also install persistent backdoors directly on the hardware.
The research identified nine vulnerabilities across four vendors: GL-iNet, Angeet, Sipeed, and JetKVM.
The most severe issue affects the Angeet ES3 KVM, where attackers can upload arbitrary files without authentication.
Once exploited, attackers can:
Because all actions occur below the OS, traditional detection tools remain ineffective.
Security teams should treat IP-KVM devices as high-risk infrastructure. Recommended actions include:
These findings highlight a growing blind spot in enterprise security. As organizations adopt cheaper hardware solutions, attackers are increasingly targeting these overlooked components to gain complete control over critical systems.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post $30 IP-KVM Vulnerabilities Expose Enterprises to BIOS-Level Attacks appeared first on Cyber Security News.
A large-scale phishing campaign is targeting software developers on GitHub, using fake Visual Studio Code…
A sophisticated evolution of Kerberoasting dubbed the “Ghost SPN” attack that allows adversaries to extract…
INDIANAPOLIS, IND. (WOWO) Indiana State Police say new funding and advances in forensic technology are…
KOKOMO, IND. (WOWO) A 62-year-old woman has been arrested after police say she stabbed a…
FORT WAYNE, IND. (WOWO) The City of Fort Wayne is offering free bike racks to…
I once saw a promising deal collapse for a surprisingly simple reason: a demo video.…
This website uses cookies.