Cyber Posture

CVE-2026-32296

High

Published: 17 March 2026

Published
17 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32296 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Eclypsium (inferred from references). Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses and minimizes permitted actions without identification or authentication, preventing exposure of the Wi-Fi configuration endpoint to unauthenticated attackers.

prevent

Enforces approved authorizations to block unauthorized access and modifications to the Wi-Fi configuration endpoint.

prevent

Protects against denial-of-service effects like memory exhaustion and KVM process termination from crafted requests to the endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated network access to exposed Wi-Fi config endpoint enables exploitation of public-facing application (T1190) for unauthorized config modification and memory exhaustion DoS via crafted requests (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the…

more

system memory and terminate the KVM process.

Deeper analysisAI

CVE-2026-32296 is a vulnerability in Sipeed NanoKVM versions prior to 2.3.1, where a Wi-Fi configuration endpoint is exposed without proper security checks. This issue, tied to CWE-306 (Missing Authentication for Critical Function), allows unauthorized modifications or disruptions. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) and was published on 2026-03-17.

An unauthenticated attacker with network access to the device can exploit the endpoint by crafting requests to alter the saved Wi-Fi network configuration to one of their choosing, potentially redirecting the device's connectivity. Alternatively, they can send requests designed to exhaust system memory, resulting in termination of the KVM process and denial of service.

The Sipeed NanoKVM CHANGELOG documents the fix in version 2.3.1, released on 2025-12-26. Additional guidance appears in advisories from Eclypsium and CISA, with full details available via the referenced sources.

Details

CWE(s)

Affected Products

Eclypsium
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-23693Shared CWE-306
CVE-2026-34731Shared CWE-306
CVE-2025-26339Shared CWE-306
CVE-2026-0545Shared CWE-306
CVE-2026-33231Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-54816Shared CWE-306
CVE-2025-53072Shared CWE-306
CVE-2026-4640Shared CWE-306
CVE-2026-40884Shared CWE-306

References