Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

What happens when AI starts building itself?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems
Identity

Hackers exploit CVE-2025-32975 (CVSS 10.0) to hijack unpatched Quest KACE SMA systems

By March 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 23, 2026Vulnerabilities / Endpoint Security

According to Arctic Wolf, attackers are suspected of exploiting a maximum severity security flaw affecting the Quest KACE Systems Management Appliance (SMA).

The cybersecurity firm said it observed malicious activity in customer environments starting the week of March 9, 2026, consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. The ultimate goal of the attack is unknown at this time.

CVE-2025-32975 (CVSS score: 10.0) refers to an authentication bypass vulnerability that allows an attacker to impersonate a legitimate user without valid credentials. Successful exploitation of this flaw could facilitate complete takeover of administrative accounts. This issue was patched by Quest in May 2025.

In the malicious activity detected by Arctic Wolf, a threat actor is believed to have used this vulnerability to seize control of an administrative account and execute remote commands to drop a Base64-encoded payload from an external server (216.126.225).[.]156) Via the curl command.

The unknown attacker then proceeded to create additional administrative accounts via ‘runkbot.exe’, a background process associated with the SMA agent used to run scripts and manage installations. We also detected changes to the Windows registry via PowerShell scripts for possible persistence or system configuration changes.

Other actions taken by threat actors are listed below.

Perform credential collection using Mimikatz. Performs discovery and reconnaissance by enumerating logged in users and administrator accounts and running “net time” and “net group” commands. Obtain Remote Desktop Protocol (RDP) access to your backup infrastructure (Veeam, Veritas) and domain controllers.

To combat this threat, we recommend that administrators apply the latest updates and do not expose their SMA instances to the internet. This issue was resolved in versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4).


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePrevious Post
Next Article Trivy Hack spreads Infostealer via Docker and triggers worm and Kubernetes Wiper

Related Posts

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

May 14, 2026

Stealer backdoor targeting developer secrets found in three node IPC versions

May 14, 2026

PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

What happens when AI starts building itself?

OpenAI is reportedly preparing legal action against Apple. This isn’t the first time my partner has been burned.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.