How I Discovered a Hidden Microphone in a Chinese NanoKVM

A security researcher tears down the affordable NanoKVM hardware KVM switch and discovers an undocumented microphone, hardcoded encryption keys, pre-installed hacking tools, and communication with Chinese servers — raising serious questions about supply chain trust.

The NanoKVM is a hardware KVM switch created by the Chinese company Sipeed. This compact device allows remote management of computers and servers via a virtual keyboard, mouse, and monitor. Thanks to its low cost (approximately 30-60 euros) and the promise of open-source code, the device attracted significant attention from the internet community.

NanoKVM device

How the Device Works

The device is equipped with an HDMI connector, three USB-C ports, an Ethernet jack, and a special serial interface. After connecting to the internet, access is provided through a web browser. The NanoKVM allows you to:

  • View the target computer's video output through a browser
  • Emulate keyboard, mouse, CD-ROM, and USB drives
  • Enter BIOS and manage the computer's power
  • Install operating systems remotely

The key difference from RDP or VNC: no software installation is required on the target machine.

NanoKVM ports and connectors

Security Problems

The author identified numerous serious vulnerabilities:

Critical flaws:

  • The device initially shipped with default passwords, and SSH access was enabled automatically
  • The encryption key for protecting passwords is hardcoded and identical across all devices
  • No protection against CSRF attacks
  • Session invalidation is impossible
  • The device uses Chinese DNS servers, with difficult custom configuration
  • It exchanges data with Sipeed servers in China
  • It does not verify the integrity of software updates
  • It contains network packet analysis tools (tcpdump, aircrack) in the production build
NanoKVM board closeup

The Hidden Microphone

The most alarming discovery was a built-in microphone measuring just 2x1 mm, not mentioned in the official documentation. The component is capable of recording high-quality audio.

The critical issue: all the necessary tools for recording were pre-installed. Via SSH, one could use the following commands:

amixer -Dhw:0 cset name='ADC Capture Volume' 20
arecord -Dhw:0,0 -d 3 -r 48000 -f S16_LE -t wav test.wav & > /dev/null &

This allows recording audio or streaming it over the network in real time. Physically removing the microphone is difficult — it requires a microscope and micro-soldering skills.

Hidden microphone closeup

Analysis

The author believes the problems are caused by carelessness and development haste rather than malicious intent. However, the combination of factors — default passwords, communication with Chinese servers, hacking tools, and a hidden microphone — raises serious concern.

Possible Solutions

Since the device runs on open-source RISC-V architecture, alternative solutions exist:

  • Porting your own Linux distribution (e.g., Debian/Ubuntu)
  • Physically extracting the built-in SD card and reprogramming it
  • Removing the microphone during disassembly
  • Connecting a speaker instead of the microphone
Board with speaker replacement

The Bigger Picture

The author raises a broader question: how many other devices might contain hidden functionality? He cites examples of problems with Apple (Siri recording private conversations) and Google, reminding us that security concerns are not limited to Chinese manufacturers alone. American companies also have obligations to cooperate with the state, as confirmed by examples from the Global Police Summit, where Apple trained police to use iPhones for surveillance.

NanoKVM disassembled