Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32291

CVE-2026-32291: GL-iNet Comet Auth Bypass Vulnerability

CVE-2026-32291 is an authentication bypass flaw in GL-iNet Comet (GL-RM1) KVM that lacks UART console authentication. Attackers with physical access can exploit this. This article covers technical details, impact, and mitigations.

Published: March 20, 2026

CVE-2026-32291 Overview

CVE-2026-32291 is a missing authentication vulnerability affecting the GL-iNet Comet (GL-RM1) KVM device. The device does not require authentication on the UART serial console, allowing attackers with physical access to gain full control over the system. This attack requires physically opening the device enclosure and connecting directly to the exposed UART pins on the circuit board.

Critical Impact

Attackers with physical access can bypass authentication entirely, potentially compromising the KVM device and any connected systems in the network infrastructure.

Affected Products

  • GL-iNet Comet (GL-RM1) KVM

Discovery Timeline

  • 2026-03-17 - CVE CVE-2026-32291 published to NVD
  • 2026-03-18 - Last updated in NVD database

Technical Details for CVE-2026-32291

Vulnerability Analysis

This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). The GL-iNet Comet KVM device exposes a UART (Universal Asynchronous Receiver-Transmitter) serial console interface that provides direct access to the device's operating system or bootloader without requiring any form of authentication. UART interfaces are commonly used during development and debugging but should be secured or disabled in production devices.

KVM (Keyboard, Video, Mouse) switches are particularly sensitive network infrastructure components as they provide direct control over multiple connected systems. A compromised KVM device could serve as a pivot point for attackers to access and control all connected machines, making this a significant supply chain and infrastructure security concern.

Root Cause

The root cause of this vulnerability is the absence of authentication mechanisms on the UART serial console interface. The manufacturer did not implement password protection, secure boot verification, or any access controls for the debug interface. This is a common oversight in embedded device development where debug interfaces are left enabled and unsecured in production firmware.

Attack Vector

The attack vector requires physical access to the device. An attacker must:

  1. Gain physical access to the GL-iNet Comet (GL-RM1) KVM device
  2. Open the device enclosure to expose the internal circuit board
  3. Identify and connect to the UART pins (typically TX, RX, and GND)
  4. Use a USB-to-UART adapter connected to a computer running terminal software
  5. Access the serial console with no authentication required

Once connected, the attacker gains direct access to the device's command interface, potentially obtaining root-level access to the underlying operating system. This could allow firmware extraction, configuration manipulation, credential harvesting, or implantation of persistent backdoors.

As detailed in the Eclypsium research blog post, inexpensive KVM devices like this one can become significant weak links in enterprise security, potentially allowing attackers to compromise entire networks through these overlooked infrastructure components.

Detection Methods for CVE-2026-32291

Indicators of Compromise

  • Physical tampering evidence on KVM device enclosures (broken seals, scratches, pry marks)
  • Unexpected configuration changes on the KVM device
  • Unknown or unauthorized firmware modifications
  • Presence of additional wires or connections inside the device housing

Detection Strategies

  • Implement physical security monitoring for network infrastructure equipment
  • Conduct regular physical inspections of KVM devices for signs of tampering
  • Use tamper-evident seals on device enclosures and monitor for breaches
  • Maintain asset inventory and chain-of-custody records for all KVM devices

Monitoring Recommendations

  • Deploy physical security cameras in areas where KVM devices are located
  • Implement asset management systems to track hardware integrity
  • Establish baseline configurations and periodically verify device settings
  • Monitor network traffic from KVM devices for anomalous patterns

How to Mitigate CVE-2026-32291

Immediate Actions Required

  • Restrict physical access to GL-iNet Comet KVM devices to authorized personnel only
  • Apply tamper-evident seals to device enclosures to detect unauthorized access
  • Consider replacing affected devices with alternatives that implement UART authentication
  • Review and audit all KVM devices in your infrastructure for similar vulnerabilities

Patch Information

No vendor patch information is currently available for this vulnerability. Physical security controls are the primary mitigation. Monitor the CISA CSAF advisory and vendor channels for updates.

Workarounds

  • Store KVM devices in locked enclosures or secure server rooms with restricted access
  • Physically disable or remove UART pins/headers if the debug interface is not required
  • Apply epoxy or conformal coating over UART test points to make access more difficult
  • Implement network segmentation to limit the impact if a KVM device is compromised
  • Consider using enterprise-grade KVM solutions with hardware security features
bash
# Physical security verification checklist
# 1. Verify tamper seals are intact on all KVM devices
# 2. Check for unauthorized modifications to device enclosures
# 3. Document serial numbers and compare against asset inventory
# 4. Inspect for additional wires or connections to circuit boards

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGl Inet

  • SeverityHIGH

  • CVSS Score7.0

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-306
  • Technical References
  • Eclypsium Blog Post

  • CISA CSAF Document

  • CVE Record CVE-2026-32291
  • Related CVEs
  • CVE-2026-32292: GL-iNet Comet Auth Bypass Vulnerability

  • CVE-2026-32290: GL-iNet Comet Auth Bypass Vulnerability

  • CVE-2025-67090: GL.iNet AX1800 Auth Bypass Vulnerability

  • CVE-2025-44018: GL-Inet GL-AXT1800 Firmware Downgrade Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English