CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Authentication Bypass in Quest KACE SMA Exploited in the Wild to Achieve Full System Compromise

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are actively exploiting CVE-2025-32975, a maximum-severity authentication bypass vulnerability in Quest KACE Systems Management Appliance (SMA), to gain administrative control over unpatched internet-exposed systems. The flaw enables attackers to impersonate legitimate users without valid credentials, leading to full system takeover. Observed activity began the week of March 9, 2026, and includes lateral movement, credential harvesting, and persistence mechanisms. The vulnerability was patched by Quest in May 2025, but unpatched systems remain at critical risk.

Timeline

  1. 23.03.2026 08:15 1 articles · 3h ago

    Active exploitation of CVE-2025-32975 in Quest KACE SMA leads to full system compromise

    Threat actors began exploiting CVE-2025-32975, a CVSS 10.0 authentication bypass flaw in Quest KACE SMA, the week of March 9, 2026. The vulnerability allows full administrative takeover without credentials. Attackers are weaponizing the flaw to execute remote commands, drop payloads, create backdoor accounts, and harvest credentials, enabling lateral movement to domain controllers and backup infrastructure.

    Show sources

Information Snippets