Before the vulnerabilities were fixed, attackers could gain maximum system privileges1
ATEN International, a manufacturer of IT connectivity and management solutions, has fixed vulnerabilities in its KVM over IP switches series CL57xx. A KVM device2 is a computer with a built-in keyboard, monitor, and touchpad in a special case designed for installation in server racks. The security issues were discovered by PT SWARM experts: Natalya Tlyapova, Denis Goryushev, and Dmitry Sklyarov. Three of the vulnerabilities were critical, and two others were classified as high-severity.
According to Mordor Intelligence, ATEN International is one of the top 5 global manufacturers of KVM switches. The company has branches in 18 countries.
KVM over IP switches are used in industrial facilities and data centers for connecting to other computers and servers. Operators can control servers as if working directly at their monitors and keyboards, without requiring any additional software installation on the devices. With KVM switches, server management isn't limited by physical proximity: operators can also connect to KVM devices remotely over the network.
The vulnerabilities (CVE-2025-3710, CVE-2025-3711, CVE-2025-3712, CVE-2025-3713, CVE-2025-3714) have CVSS 3.1 scores from 7.5 to 9.8. Successful exploitation of the three most dangerous vulnerabilities could give the attacker control of the connected servers.
1An extensive set of privileges that allows a selected user (for example, an administrator) to perform operations unavailable to regular users, including modifying system parameters, uninstalling software, or otherwise changing system functionality.
2KVM stands for "keyboard, video, mouse."