Critical Flaws in KiloView Devices Enable Complete Admin Takeover


The Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a critical vulnerability affecting multiple versions of KiloView Encoder Series devices, warning that unauthenticated attackers could gain full administrative access.

Issued under alert code ICSA-26-029-01 on January 29, 2026, the flaw carries a severe CVSS v3 score of 9.8, indicating extreme risk to affected infrastructure.

The vulnerability, tracked as CVE-2026-1453, stems from the lack of authentication mechanisms for critical administrative functions.

VulnerabilityCVSS ScoreVendorEquipmentType
CVE-2026-14539.8KiloViewKiloView Encoder SeriesMissing Authentication for Critical Function

Successful exploitation allows attackers to create or delete administrator accounts without authorization, effectively granting complete control over the affected devices.

This authentication bypass represents a fundamental security failure that remote, unauthenticated actors can trigger.

KiloView Encoder devices are widely deployed across critical infrastructure sectors, including communications and information technology.

The company, headquartered in China, manufactures encoding equipment used globally, making this vulnerability a concern for organizations worldwide.

The vulnerability affects multiple hardware versions and firmware builds across eight encoder series variants, including the E1, E2, G1, P1, P2, and RE1 lines.

Researchers Muhammad Ammar (0xam225) discovered and reported the vulnerability to CISA, demonstrating responsible disclosure practices.

The agency has found no evidence of active exploitation at this time. However, the critical nature of the flaw suggests urgent remediation is necessary.

CISA recommends immediate defensive measures, including network isolation of affected devices and restriction of Internet accessibility.

Organizations should deploy control system networks behind firewalls and isolate them from business networks.

When remote access is unavoidable, organizations should implement Virtual Private Networks (VPNs) with current security patches. However, administrators must recognize that VPNs carry their own vulnerabilities.

Organizations should minimize network exposure for all control system devices and evaluate risk before implementing defensive measures.

CISA encourages implementation of defense-in-depth strategies and comprehensive cybersecurity planning for industrial control systems.

No public exploitation of this vulnerability has been reported, providing a critical window for organizations to patch systems before potential attackers weaponize the flaw.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link