VulnerabilitiesHIGH

CVE-2025-32975 - Exploitation of Quest KACE Systems

🎯

Basically, a flaw in Quest KACE lets hackers take control of systems without permission.

Quick Summary

Arctic Wolf has detected exploitation of a critical vulnerability in Quest KACE Systems Management Appliances. Unpatched systems are at risk of unauthorized access and administrative takeover. Organizations must act quickly to patch their systems and secure their environments.

The Flaw

CVE-2025-32975 is a critical authentication bypass vulnerability found in the Quest KACE Systems Management Appliance (SMA). This flaw allows attackers to impersonate legitimate users without needing valid credentials. The vulnerability stems from issues in the Single Sign-On (SSO) authentication handling mechanism, enabling an attacker to gain complete administrative control over the system. The vulnerability was patched in May 2025, yet many systems remain unpatched and exposed.

Starting the week of March 9, 2026, Arctic Wolf began observing malicious activity potentially linked to this vulnerability. The exploitation primarily targets unpatched Quest KACE SMA instances that are publicly accessible on the internet. The urgency of addressing this vulnerability cannot be overstated, as it poses a significant risk to organizations relying on these systems for endpoint management.

What's at Risk

Organizations using Quest KACE SMA could face severe consequences if they do not address this vulnerability. The administrative takeover achieved through CVE-2025-32975 allows attackers to execute malicious commands, create unauthorized accounts, and harvest credentials. The potential for data breaches and unauthorized access to sensitive information is high, especially for organizations that manage critical infrastructure or sensitive data.

The observed exploitation includes various tactics, such as executing remote commands and establishing command-and-control communication. If attackers gain access, they can manipulate system settings, deploy malware, or use the compromised system as a launchpad for further attacks within the network.

Patch Status

The vulnerability was officially patched in May 2025, yet many organizations have not implemented the necessary updates. Arctic Wolf has not reported any known exploitation of CVE-2025-32975 until recently, but the presence of unpatched systems in the wild raises alarms. Organizations must prioritize patching to mitigate the risk of exploitation.

Failure to apply the patch leaves systems vulnerable to attackers who can easily exploit this flaw. Regular patch management is crucial to maintaining security and preventing unauthorized access. Organizations should also monitor their systems for any signs of exploitation or unusual activity.

Immediate Actions

To protect against the risks posed by CVE-2025-32975, organizations should take immediate action:

  • Patch all Quest KACE SMA instances to the latest version to close the vulnerability.
  • Audit user accounts and remove any unauthorized administrative accounts created during potential exploitation.
  • Monitor logs for unusual activity, such as unexpected administrative changes or command executions.
  • Implement network segmentation to limit exposure of critical systems to the internet.

By following these steps, organizations can significantly reduce their risk and protect their systems from exploitation. The time to act is now, as the consequences of inaction could be dire.

🔒 Pro insight: The exploitation of CVE-2025-32975 highlights the critical need for timely patch management in enterprise environments to prevent unauthorized access.

Original article from

Arctic Wolf Blog · Andres Ramos

Read Full Article

Related Pings

HIGHVulnerabilities

CVE-2025-32975 - Exploitation of Quest KACE Systems Alert

Malicious activity linked to CVE-2025-32975 has been observed on unpatched Quest KACE Systems Management Appliances. This vulnerability allows unauthorized access, risking administrative control. Organizations must patch their systems to mitigate these risks.

Arctic Wolf Blog·
HIGHVulnerabilities

PolyShell Vulnerability - Unauthenticated RCE in Magento Stores

A new vulnerability called 'PolyShell' threatens Magento e-stores by allowing unauthorized remote code execution. This flaw affects all versions of Magento Open Source and Adobe Commerce. Immediate action is required to secure these platforms from potential attacks.

BleepingComputer·
HIGHVulnerabilities

Spring Security Vulnerabilities - Critical Updates Released

Spring has issued critical updates for vulnerabilities in Spring Boot and Spring Security. Users must act quickly to apply these updates to prevent unauthorized access. Protect your applications by reviewing the advisories and updating your systems.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Kubernetes Vulnerability - Urgent Advisory for Ingress-NGINX

Kubernetes has issued a security advisory for ingress-nginx vulnerabilities, affecting several versions. Users must update to secure versions to prevent exploitation. This is critical for maintaining operational integrity.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

SharePoint Vulnerability - Attackers Exploit Critical Flaw

A critical vulnerability in SharePoint is being exploited by unknown attackers, posing significant risks to organizations. The US government has issued urgent warnings to patch this flaw. Immediate action is necessary to protect sensitive data and systems.

The Register Security·
HIGHVulnerabilities

Vulnerabilities - Critical ScreenConnect Flaw Exposes Machine Keys

A critical vulnerability in ScreenConnect exposes machine keys, risking unauthorized access. Users must update to version 26.1 to secure their systems. This flaw underscores the need for robust key management practices.

SecurityWeek·