CRITICAL
The advisory highlights a significant risk due to the widespread use of KVM switches in enterprise environments. Given the potential for full network compromise and lack of specific patches, real-world exploitability is high.

The advisory discusses how low-cost KVM switches can be exploited to gain unauthorized access and control over networked systems. Attackers can use these devices as a pivot point to compromise the entire network infrastructure, affecting organizations that rely on such hardware for managing multiple computers.

Affected Systems
  • KVM Switches from multiple manufacturers
Affected Versions: All versions
Remediation
  • Replace or update vulnerable KVM switches with models that incorporate secure authentication methods.
  • Implement network segmentation to isolate KVM switch management networks from the main corporate network.
  • Enable and configure physical access controls around KVM devices.
Stack Impact

This affects hardware at the network infrastructure level, primarily impacting physical security measures but indirectly affecting all connected services such as servers running nginx, docker containers, and any systems integrated with these switches.

Source →