Patch now! Attacks on Quest KACE Systems Management Appliance

Attackers are logging into the Quest KACE Systems Management Appliance endpoint management system. A security patch has been available for a long time.

listen Print view
Screen with 1s and 0s

(Image: antb/Shutterstock.com)

2 min. read

Attackers are currently exploiting a “critical” security vulnerability in the Quest KACE Systems Management Appliance (SMA) endpoint management system, compromising publicly accessible instances. Security updates have been available for download since May of last year. Apparently, not all SMA admins have installed them yet.

Security researchers from Arctic Wolf are pointing out the attacks in a post. According to a warning from software manufacturer Quest, the “critical” vulnerability (CVE-2025-32975) with the highest possible CVSS score of 10 out of 10 affects SSO authentication.

Due to unspecified errors, attackers can bypass login and access systems as any legitimate user. They can then completely take over instances with administrative rights.

How attacks specifically proceed and what attackers do with compromised systems is currently unclear. It is also currently unknown to what extent the attacks are occurring. Admins should ensure that one of the secured SMA versions is installed. The patches also close further vulnerabilities (CVE-2025-32976, CVE-2025-32977, CVE-2025-32978), which, according to security researchers, are not relevant to the currently ongoing attacks.

Videos by heise

  • 13.0.385
  • 13.1.81
  • 13.2.183
  • 14.0.341 (Patch 5)
  • 14.1.101 (Patch 4)

In addition to installing the security updates, admins should not make the endpoint management system publicly accessible. If this is unavoidable, access must be secured via a VPN connection, for example. This applies not only to SMA but generally.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.