CVE-2026-32294

Published: Mar 17, 2026 Last Modified: Mar 17, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,0
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: active
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 4,7
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Attack Vector: local
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: none

Description

AI Translation Available

JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding SHA256 hash to pass verification.

345

Insufficient Verification of Data Authenticity

Draft
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Varies By Context Unexpected State
Applicable Platforms
Technologies: ICS/OT
View CWE Details
347

Improper Verification of Cryptographic Signature

Draft
Common Consequences
Security Scopes Affected:
Access Control Integrity Confidentiality
Potential Impacts:
Gain Privileges Or Assume Identity Modify Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
View CWE Details
https://eclypsium.com/blog/kvm-devices-the-keys-to-your-kingdom-are-hanging-on-…
https://github.com/jetkvm/kvm/releases/tag/release%2F0.5.4
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025…
https://www.cve.org/CVERecord?id=CVE-2026-32294