Active exploitation of N-able N-central vulnerabilities
Summary
Hide β²
Show βΌ
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation. N-able N-central is a Remote Monitoring and Management (RMM) platform used by Managed Service Providers (MSPs). The vulnerabilities, CVE-2025-8875 and CVE-2025-8876, allow for command execution and command injection. Both vulnerabilities require authentication to exploit and have been addressed in N-central versions 2025.3.1 and 2024.6 HF2. N-able has urged customers to upgrade and enable multi-factor authentication (MFA). The exact exploitation methods and scale are unknown. FCEB agencies must apply fixes by August 20, 2025. The vulnerabilities are not expected to be used at the beginning of an exploit chain, and exploitation does not appear to be widespread. Over 800 N-able N-central servers remain unpatched against these vulnerabilities.
Timeline
-
14.08.2025 07:02 π° 3 articles Β· β± 1mo ago
CISA adds N-able N-central vulnerabilities to KEV catalog
Over 800 N-able N-central servers remain unpatched against the vulnerabilities. Approximately 2,000 N-central instances are currently exposed online. The Shadowserver Foundation is tracking 880 vulnerable N-central servers, primarily located in the United States, Canada, and the Netherlands. CISA has urged all network defenders to secure their systems against ongoing attacks, emphasizing the significant risks these vulnerabilities pose.
Show sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
Information Snippets
-
N-able N-central is an RMM platform for managing and securing Windows, Apple, and Linux endpoints.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
CVE-2025-8875 is an insecure deserialization vulnerability leading to command execution.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
CVE-2025-8876 is a command injection vulnerability via improper sanitization of user input.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
Both vulnerabilities require authentication to exploit.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
The flaws were addressed in N-central versions 2025.3.1 and 2024.6 HF2, released on August 13, 2025.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
N-able recommends enabling multi-factor authentication (MFA), especially for admin accounts.
First reported: 14.08.2025 07:02π° 1 source, 1 articleShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
-
Evidence of exploitation exists in a limited number of on-premises environments.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
No evidence of exploitation in N-able hosted cloud environments has been found.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
FCEB agencies must apply the necessary fixes by August 20, 2025.
First reported: 14.08.2025 07:02π° 3 sources, 3 articlesShow sources
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog β thehackernews.com β 14.08.2025 07:02
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
CVE-2025-8875 has a CVSS score of 9.4.
First reported: 14.08.2025 21:58π° 1 source, 1 articleShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
-
CVE-2025-8876 is an improper input validation vulnerability.
First reported: 14.08.2025 21:58π° 1 source, 1 articleShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
-
The vulnerabilities are not expected to be used at the beginning of an exploit chain.
First reported: 14.08.2025 21:58π° 2 sources, 2 articlesShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
N-able has communicated the hotfix to all N-central customers.
First reported: 14.08.2025 21:58π° 1 source, 1 articleShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
-
N-able is continuing its investigation into the matter and will update customers with additional information as available.
First reported: 14.08.2025 21:58π° 1 source, 1 articleShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
-
The exploitation does not appear to be widespread.
First reported: 14.08.2025 21:58π° 2 sources, 2 articlesShow sources
- CISA Warns N-able Bugs Under Attack, Patch Now β www.darkreading.com β 14.08.2025 21:58
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
Over 800 N-able N-central servers remain unpatched against CVE-2025-8875 and CVE-2025-8876.
First reported: 18.08.2025 19:06π° 1 source, 1 articleShow sources
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
Approximately 2,000 N-central instances are currently exposed online.
First reported: 18.08.2025 19:06π° 1 source, 1 articleShow sources
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
-
Shadowserver Foundation is tracking 880 N-central servers vulnerable to the two vulnerabilities.
First reported: 18.08.2025 19:06π° 1 source, 1 articleShow sources
- Over 800 N-able servers left unpatched against critical flaws β www.bleepingcomputer.com β 18.08.2025 19:06
Similar Happenings
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
Akira Ransomware Group Exploits SonicWall SSL VPN Flaws
The Akira ransomware group has been actively exploiting SonicWall SSL VPN flaws and misconfigurations to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting SonicWall devices to facilitate ransomware operations. The group leverages a combination of security vulnerabilities, including a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings, to bypass access controls and infiltrate networks. Organizations are advised to rotate passwords, remove unused accounts, enable multi-factor authentication, and restrict access to the Virtual Office Portal to mitigate risks. The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of SonicWall SSL VPNs and issued alerts about the increased exploitation of CVE-2024-40766.
Microsoft September 2025 Patch Tuesday fixes 81 vulnerabilities, including two zero-days
Microsoft released updates for 80 vulnerabilities on September 2025 Patch Tuesday. None of these vulnerabilities were zero-days. The updates address eight critical flaws, including five remote code execution vulnerabilities, one information disclosure, and two elevation of privilege vulnerabilities. The vulnerabilities span various categories: 38 elevation of privilege, 2 security feature bypass, 22 remote code execution, 14 information disclosure, 3 denial of service, and 1 spoofing. One zero-day vulnerability was fixed in Windows SMB Server. The updates also include hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing. The patch includes 38 elevation of privilege vulnerabilities, the highest number among all categories. CVE-2025-54918 is an EoP vulnerability in Windows NT LAN Manager (NTLM) marked as critical. CVE-2025-54111 and CVE-2025-54913 are EoP flaws in Windows UI XAML, allowing privilege escalation via phished credentials or malicious Microsoft Store apps. CVE-2025-55232 is an RCE vulnerability in the Microsoft High Performance Compute (HPC) Pack with a CVSS score of 9.8. CVE-2025-54916 is an RCE vulnerability in Windows NTFS that can be triggered by authenticated users. Microsoft's patch update includes recommendations for preparing for the end-of-life of Windows 10 and mandatory multifactor authentication (MFA) for Azure in October 2025.
Critical SessionReaper flaw in Adobe Commerce and Magento Open Source patched
Adobe has patched a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms, dubbed SessionReaper. The flaw could allow unauthenticated attackers to take control of customer accounts via the Commerce REST API. The vulnerability was disclosed to selected customers on September 4, 2025, with a patch released on September 9, 2025. Adobe Commerce on Cloud users were protected by a WAF rule until the patch was available. The flaw is considered one of the most severe in the history of the platform, potentially leading to session forging, privilege escalation, and code execution. No exploitation in the wild has been reported, but a hotfix was leaked, which could accelerate exploitation attempts. The vulnerability impacts various versions of Adobe Commerce, Adobe Commerce B2B, Magento Open Source, and the Custom Attributes Serializable module. Adobe has also patched a critical path traversal vulnerability in ColdFusion (CVE-2025-54261).
Critical SAP NetWeaver vulnerabilities patched, including remote code execution flaw
SAP has fixed 21 vulnerabilities, including three critical flaws in its NetWeaver software. The most severe, CVE-2025-42944, is an insecure deserialization flaw allowing unauthenticated remote code execution. The second critical flaw, CVE-2025-42922, enables arbitrary file uploads by authenticated users. The third, CVE-2025-42958, allows unauthorized access to sensitive data and administrative functions. The vulnerabilities affect various SAP products, including ERP, CRM, SRM, and SCM, which are widely used in large enterprise networks. The flaws could lead to full system compromise and unauthorized data manipulation. SAP products are frequently targeted by threat actors due to their handling of mission-critical data. A high-severity missing input validation bug in SAP S/4HANA (CVE-2025-42916) could allow an attacker with high privilege access to delete the content of arbitrary database tables. A critical security defect in SAP S/4HANA (CVE-2025-42957) has come under active exploitation in the wild.