zlacker

[return to "How I discovered a hidden microphone on a Chinese NanoKVM"]
1. jlward+Cc[view] [source] 2025-12-06 15:41:18
>>ementa+(OP)
I recently discovered a similar concerning security issue with my KVM. In my case it was a pretty standard KVM for multiple machines to share a keyboard, mouse, and screen but also Ethernet. One day while looking at my home network I noticed the KVM had its own IP and was transferring GBs of data everyday. I quickly blocked it from my network. But having used it for a number of months I worried that with screen capture and access to all my input devices, someone could have gotten access to pretty much everything I use. I wasn’t able to figure out if any data was actually being sent off my network and I really didn’t want to put myself in any more risk so I just threw it in an electronics recycling bin. Pretty scary what a network connected KVM could maliciously do.
◧◩
2. stragi+Ge[view] [source] 2025-12-06 15:58:19
>>jlward+Cc
Why did you not just login to the device, and switched off "Broadcast to multicast", or changed the destination address?

Edit: Some brands of Network-KVM use this, so that you can control the target device from another device, like e.g. an App on a tablet. That way you don't have to stand next to the target device in the noisy and cold machine room

◧◩◪
3. jlward+dJ[view] [source] 2025-12-06 20:01:47
>>stragi+Ge
The KVM didn't have any documentation on anything related to its network interface. I ran a port scan on it but didn't know if there was a way to log into it.
◧◩◪◨
4. simonc+741[view] [source] 2025-12-06 23:14:18
>>jlward+dJ
> The KVM didn't have any documentation on anything related to its network interface.

My research disagrees. See [0]

[0] <>>46177462 >

[go to top]