Cyber Posture

CVE-2026-32296

High

Published: 17 March 2026

Published
17 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the…

more

system memory and terminate the KVM process.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses and minimizes permitted actions without identification or authentication, preventing exposure of the Wi-Fi configuration endpoint to unauthenticated attackers.

prevent

Enforces approved authorizations to block unauthorized access and modifications to the Wi-Fi configuration endpoint.

prevent

Protects against denial-of-service effects like memory exhaustion and KVM process termination from crafted requests to the endpoint.

Security SummaryAI

CVE-2026-32296 is a vulnerability in Sipeed NanoKVM versions prior to 2.3.1, where a Wi-Fi configuration endpoint is exposed without proper security checks. This issue, tied to CWE-306 (Missing Authentication for Critical Function), allows unauthorized modifications or disruptions. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) and was published on 2026-03-17.

An unauthenticated attacker with network access to the device can exploit the endpoint by crafting requests to alter the saved Wi-Fi network configuration to one of their choosing, potentially redirecting the device's connectivity. Alternatively, they can send requests designed to exhaust system memory, resulting in termination of the KVM process and denial of service.

The Sipeed NanoKVM CHANGELOG documents the fix in version 2.3.1, released on 2025-12-26. Additional guidance appears in advisories from Eclypsium and CISA, with full details available via the referenced sources.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated network access to exposed Wi-Fi config endpoint enables exploitation of public-facing application (T1190) for unauthorized config modification and memory exhaustion DoS via crafted requests (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References