Critical Vulnerabilities Found in IP KVMs from Top Manufacturers
Researchers have uncovered severe security flaws in internet-exposed KVM devices from four major manufacturers. These vulnerabilities could allow attackers to gain BIOS-level access to systems. The findings highlight significant risks for enterprises relying on these devices for remote management.

Researchers have disclosed critical vulnerabilities in IP-based Keyboard, Video, and Mouse (KVM) devices from four leading manufacturers. These devices, which provide BIOS-level access to systems, were found to have significant security flaws that could allow attackers to take control of connected systems remotely. The vulnerabilities were uncovered during a comprehensive security review of internet-exposed KVM devices, revealing potential risks for enterprises that rely on these tools for remote management.
The implications of these vulnerabilities are severe. KVM devices are often used in data centers and enterprise environments to manage multiple systems from a single interface. The ability to gain BIOS-level access means attackers could potentially bypass security measures and take control of entire networks. This highlights the importance of securing all internet-facing devices, especially those that provide administrative access to critical systems. The findings also underscore the need for manufacturers to prioritize security in the design and deployment of such devices.
The affected manufacturers have been notified and are reportedly working on patches to address the vulnerabilities. However, the disclosure of these flaws serves as a wake-up call for organizations to review their use of IP KVMs and ensure they are properly secured. The researchers have advised enterprises to disable internet exposure of these devices and implement additional security measures until patches are available. The incident also raises questions about the broader security of remote management tools and the need for more rigorous security standards in the industry.