Hackers Exploit Critical CVE-2025-32975 Flaw to Compromise Quest KACE Systems

Threat actors are actively exploiting a critical security vulnerability, tracked as CVE-2025-32975, impacting Quest’s KACE Systems Management Appliance (SMA), with reports indicating real-world attacks on unpatched systems. The flaw carries a maximum severity score of 10.0 and allows attackers to bypass authentication, enabling them to impersonate legitimate users without needing valid credentials.
The vulnerability affects internet-exposed KACE SMA instances, which are widely used by enterprises for endpoint management functions such as software deployment, asset tracking, and patch management. Due to the centralized control these systems provide, successful exploitation can lead to a complete administrative takeover, giving attackers extensive control over enterprise environments.
According to cybersecurity firm Arctic Wolf, malicious activity linked to this flaw was observed beginning in early March 2026. Attackers are believed to be leveraging the vulnerability to gain initial access, escalate privileges, and execute remote commands, including deploying encoded payloads to compromised systems.
The issue had originally been patched by Quest in May 2025, but organizations that have not applied updates remain highly vulnerable. Security researchers suggest that the attacks are likely opportunistic, targeting exposed and unpatched systems rather than specific industries or regions.
At present, the identity of the attackers and their exact objectives remain unclear. However, given the critical nature of the vulnerability and its ease of exploitation, cybersecurity experts are urging organizations to immediately apply available patches, restrict external access to management interfaces, and monitor systems for any suspicious activity.
The incident highlights the ongoing risks associated with delayed patch management and reinforces the importance of securing internet-facing enterprise infrastructure against rapidly evolving cyber threats.
- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch