CVSS 9.8CRITICAL
ARIA assesses this as CRITICAL due to the potential for full system compromise through unauthorized BIOS-level access, which can be exploited remotely. Given the severity and remote exploitability, real-world attacks are highly likely if not mitigated.

Internet Protocol (IP) KVM devices from four major manufacturers are vulnerable to multiple security flaws. Attackers can exploit these vulnerabilities to gain unauthorized BIOS-level access, potentially leading to full system compromise. System administrators and enterprises using IP KVMs for remote server management are at risk.

Affected Systems
  • IP KVM devices from four major manufacturers
Affected Versions: All versions before patch release
Remediation
  • Apply vendor-specific patches as soon as they become available.
  • Review and update the firmware of all IP KVM devices to the latest version provided by the manufacturer.
  • Isolate or remove Internet exposure for IP KVM devices if not necessary.
Stack Impact

This issue does not directly affect nginx, docker, linux kernel, openssh, curl, openssl, python, but impacts system management components that might be integrated with these services.

Source →