CVE-2026-32296
Published: 17 March 2026
Summary
CVE-2026-32296 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Eclypsium (inferred from references). Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses and minimizes permitted actions without identification or authentication, preventing exposure of the Wi-Fi configuration endpoint to unauthenticated attackers.
Enforces approved authorizations to block unauthorized access and modifications to the Wi-Fi configuration endpoint.
Protects against denial-of-service effects like memory exhaustion and KVM process termination from crafted requests to the endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated network access to exposed Wi-Fi config endpoint enables exploitation of public-facing application (T1190) for unauthorized config modification and memory exhaustion DoS via crafted requests (T1499.004).
NVD Description
Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the…
more
system memory and terminate the KVM process.
Deeper analysisAI
CVE-2026-32296 is a vulnerability in Sipeed NanoKVM versions prior to 2.3.1, where a Wi-Fi configuration endpoint is exposed without proper security checks. This issue, tied to CWE-306 (Missing Authentication for Critical Function), allows unauthorized modifications or disruptions. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) and was published on 2026-03-17.
An unauthenticated attacker with network access to the device can exploit the endpoint by crafting requests to alter the saved Wi-Fi network configuration to one of their choosing, potentially redirecting the device's connectivity. Alternatively, they can send requests designed to exhaust system memory, resulting in termination of the KVM process and denial of service.
The Sipeed NanoKVM CHANGELOG documents the fix in version 2.3.1, released on 2025-12-26. Additional guidance appears in advisories from Eclypsium and CISA, with full details available via the referenced sources.
Details
- CWE(s)