Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32292: CWE-307 Improper Restriction of Excessive Authentication Attempts in GL-iNet Comet KVM

0
Critical
VulnerabilityCVE-2026-32292cvecve-2026-32292cwe-307
Published: Tue Mar 17 2026 (03/17/2026, 17:18:54 UTC)
Source: CVE Database V5
Vendor/Project: GL-iNet
Product: Comet KVM

Description

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 00:38:42 UTC

Technical Analysis

CVE-2026-32292 identifies a critical security flaw in the GL-iNet Comet (GL-RM1) KVM web interface, specifically an improper restriction of excessive authentication attempts (CWE-307). The vulnerability arises because the web interface does not impose any limits on the number of login attempts, allowing attackers to perform unlimited brute-force attacks to guess valid user credentials. The attack vector is network-based, requiring no prior authentication or user interaction, which significantly lowers the barrier to exploitation. The vulnerability affects version 0 of the product and has been assigned a CVSS 4.0 score of 9.3, indicating critical severity with high impact on confidentiality and system integrity. The CVSS vector highlights that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and results in high confidentiality impact (VC:H) and scope change (SI:H). No patches or official fixes have been released yet, and no known exploits have been detected in the wild. The vulnerability could allow attackers to gain unauthorized access to the KVM management interface, potentially leading to full control over the device and connected systems. This is especially concerning for environments relying on remote KVM for critical infrastructure management. The lack of brute-force protection mechanisms such as account lockout, rate limiting, or CAPTCHA makes this vulnerability straightforward to exploit using automated tools.

Potential Impact

The impact of CVE-2026-32292 is significant for organizations using GL-iNet Comet KVM devices, as successful exploitation can lead to unauthorized administrative access. This compromises confidentiality by exposing sensitive credentials and potentially sensitive data managed through the KVM interface. Integrity and availability may also be affected if attackers manipulate device settings or disrupt operations. Given the critical nature of KVM devices in managing hardware remotely, attackers gaining control could pivot to other internal systems, escalate privileges, or cause operational disruptions. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The absence of known exploits in the wild suggests this is a newly disclosed vulnerability, but the high severity score and straightforward attack vector indicate a strong potential for future exploitation. Organizations in sectors such as telecommunications, data centers, cloud providers, and critical infrastructure that rely on remote KVM management are particularly at risk.

Mitigation Recommendations

1. Immediately isolate GL-iNet Comet KVM devices from public or untrusted networks to reduce exposure. 2. Implement network-level protections such as firewall rules or VPN access to restrict management interface access to trusted administrators only. 3. Deploy external brute-force mitigation tools like fail2ban or intrusion prevention systems to detect and block repeated failed login attempts targeting the KVM interface. 4. Monitor authentication logs closely for unusual login patterns or repeated failures indicative of brute-force attempts. 5. Where possible, enforce strong, complex passwords and consider multi-factor authentication if supported by the device or surrounding infrastructure. 6. Engage with GL-iNet support channels to obtain updates or patches as they become available and apply them promptly. 7. Consider alternative secure remote management solutions if immediate patching is not feasible. 8. Conduct regular security assessments of remote management devices to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2026-03-11T18:26:16.060Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b992ba771bdb1749c53e22

Added to database: 3/17/2026, 5:43:22 PM

Last enriched: 3/25/2026, 12:38:42 AM

Last updated: 5/2/2026, 12:28:37 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses