CVE-2026-32297
Published: 17 March 2026
Summary
CVE-2026-32297 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Angeet Es3 Kvm Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and correction of flaws like CVE-2026-32297 to prevent arbitrary file write exploitation.
Explicitly identifies and precludes critical unauthenticated actions such as remote arbitrary file writes on the KVM system.
Monitors software, firmware, configuration files, and system binaries for unauthorized modifications resulting from CVE-2026-32297 exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated arbitrary file write (incl. system binaries/configs) on public-facing KVM device directly maps to T1190 for initial access and enables T1554 by overwriting host binaries to achieve full control.
NVD Description
The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerable system.
Deeper analysisAI
CVE-2026-32297 affects the Angeet ES3 KVM, enabling a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. This vulnerability, published on 2026-03-17, is rated 7.5 on the CVSS v3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps to CWE-306 (Missing Authentication for Critical Function). Overwriting such files compromises system integrity, potentially leading to full attacker control.
A remote attacker requires only network access to the vulnerable Angeet ES3 KVM, with no privileges, authentication, or user interaction needed. Successful exploitation allows modification of configuration files or system binaries, enabling the attacker to achieve complete control of the affected system.
Mitigation guidance is available in related advisories, including the Eclypsium analysis at https://eclypsium.com/blog/kvm-devices-the-keys-to-your-kingdom-are-hanging-on-the-network/, the CISA CSAF document at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-076-01.json, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2026-32297.
Details
- CWE(s)