
Threat actors are actively exploiting a critical security vulnerability, tracked as CVE-2025-32975, impacting Quest’s KACE Systems Management Appliance (SMA), with reports indicating real-world attacks on unpatched systems. The flaw carries a maximum severity score of 10.0 and allows attackers to bypass authentication, enabling them to impersonate legitimate users without needing valid credentials.
The vulnerability affects internet-exposed KACE SMA instances, which are widely used by enterprises for endpoint management functions such as software deployment, asset tracking, and patch management. Due to the centralized control these systems provide, successful exploitation can lead to a complete administrative takeover, giving attackers extensive control over enterprise environments.
According to cybersecurity firm Arctic Wolf, malicious activity linked to this flaw was observed beginning in early March 2026. Attackers are believed to be leveraging the vulnerability to gain initial access, escalate privileges, and execute remote commands, including deploying encoded payloads to compromised systems.
The issue had originally been patched by Quest in May 2025, but organizations that have not applied updates remain highly vulnerable. Security researchers suggest that the attacks are likely opportunistic, targeting exposed and unpatched systems rather than specific industries or regions.
At present, the identity of the attackers and their exact objectives remain unclear. However, given the critical nature of the vulnerability and its ease of exploitation, cybersecurity experts are urging organizations to immediately apply available patches, restrict external access to management interfaces, and monitor systems for any suspicious activity.
The incident highlights the ongoing risks associated with delayed patch management and reinforces the importance of securing internet-facing enterprise infrastructure against rapidly evolving cyber threats.




