Cyber Posture

CVE-2026-32297

High

Published: 17 March 2026

Published
17 March 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0004 11.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32297 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Angeet Es3 Kvm Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of flaws like CVE-2026-32297 to prevent arbitrary file write exploitation.

prevent

Explicitly identifies and precludes critical unauthenticated actions such as remote arbitrary file writes on the KVM system.

detect

Monitors software, firmware, configuration files, and system binaries for unauthorized modifications resulting from CVE-2026-32297 exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1554 Compromise Host Software Binary Persistence
Adversaries may modify host software binaries to establish persistent access to systems.
Why these techniques?

Remote unauthenticated arbitrary file write (incl. system binaries/configs) on public-facing KVM device directly maps to T1190 for initial access and enables T1554 by overwriting host binaries to achieve full control.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerable system.

Deeper analysisAI

CVE-2026-32297 affects the Angeet ES3 KVM, enabling a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. This vulnerability, published on 2026-03-17, is rated 7.5 on the CVSS v3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps to CWE-306 (Missing Authentication for Critical Function). Overwriting such files compromises system integrity, potentially leading to full attacker control.

A remote attacker requires only network access to the vulnerable Angeet ES3 KVM, with no privileges, authentication, or user interaction needed. Successful exploitation allows modification of configuration files or system binaries, enabling the attacker to achieve complete control of the affected system.

Mitigation guidance is available in related advisories, including the Eclypsium analysis at https://eclypsium.com/blog/kvm-devices-the-keys-to-your-kingdom-are-hanging-on-the-network/, the CISA CSAF document at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-076-01.json, and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2026-32297.

Details

CWE(s)

Affected Products

angeet
es3 kvm firmware
all versions

CVEs Like This One

CVE-2026-32298Same product: Angeet Es3 Kvm
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306
CVE-2026-24177Shared CWE-306

References