Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems

Cursor acknowledges that the new coding model was built on top of Moonshot AI’s Kim

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems
Identity

Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems

By March 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 23, 2026Vulnerabilities / Endpoint Security

According to Arctic Wolf, attackers are suspected of exploiting a maximum severity security flaw affecting the Quest KACE Systems Management Appliance (SMA).

The cybersecurity firm said it observed malicious activity in customer environments starting the week of March 9, 2026, consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. The ultimate goal of the attack is unknown at this time.

CVE-2025-32975 (CVSS score: 10.0) refers to an authentication bypass vulnerability that allows an attacker to impersonate a legitimate user without valid credentials. Successful exploitation of this flaw could facilitate complete takeover of administrative accounts. This issue was patched by Quest in May 2025.

In the malicious activity detected by Arctic Wolf, a threat actor is believed to have used this vulnerability to seize control of an administrative account and execute remote commands to drop a Base64-encoded payload from an external server (216.126.225).[.]156) Via the curl command.

The unknown attacker then proceeded to create additional administrative accounts via ‘runkbot.exe’, a background process associated with the SMA agent used to run scripts and manage installations. We also detected changes to the Windows registry via PowerShell scripts for possible persistence or system configuration changes.

Other actions taken by threat actors are listed below.

Perform credential collection using Mimikatz. Performs discovery and reconnaissance by enumerating logged in users and administrator accounts and running “net time” and “net group” commands. Obtain Remote Desktop Protocol (RDP) access to your backup infrastructure (Veeam, Veritas) and domain controllers.

To combat this threat, we recommend that administrators apply the latest updates and do not expose their SMA instances to the internet. This issue was resolved in versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4).


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePrevious Post

Related Posts

FBI warns Russian hackers are targeting Signal, WhatsApp in massive phishing attack

March 21, 2026

CISA flags Apple, Craft CMS, KEV’s Laravel bug and orders patching by April 3, 2026

March 21, 2026

Trivy supply chain attack causes CanisterWorm to self-spread across 47 npm packages

March 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems

Cursor acknowledges that the new coding model was built on top of Moonshot AI’s Kim

Delve accused of misleading customers with ‘false compliance’

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.