Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11367: CWE-502 Deserialization of Untrusted Data in N-able N-central

0
Critical
VulnerabilityCVE-2025-11367cvecve-2025-11367cwe-502
Published: Wed Nov 12 2025 (11/12/2025, 15:34:54 UTC)
Source: CVE Database V5
Vendor/Project: N-able
Product: N-central

Description

The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via deserialization

AI-Powered Analysis

AILast updated: 11/12/2025, 16:04:00 UTC

Technical Analysis

CVE-2025-11367 is a critical vulnerability identified in the N-central Software Probe component of N-able's N-central product, affecting versions prior to 2025.4. The root cause is unsafe deserialization of untrusted data (CWE-502), a common security flaw where serialized data from untrusted sources is deserialized without proper validation or sanitization. This flaw enables remote attackers to craft malicious serialized objects that, when processed by the vulnerable software, lead to arbitrary code execution on the host system. The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity and no privileges or user interaction needed, resulting in high impact on confidentiality, integrity, and availability. N-central is widely used by managed service providers and enterprises for remote monitoring and management of IT infrastructure, meaning exploitation could lead to full compromise of critical management systems, lateral movement, and persistent access. Although no public exploits or active exploitation have been reported yet, the criticality and ease of exploitation necessitate urgent attention. The lack of currently available patches increases the risk window. Organizations relying on N-central should prepare for imminent patch deployment and implement compensating controls to detect and prevent exploitation attempts.

Potential Impact

The impact of CVE-2025-11367 on European organizations is substantial due to the critical role N-central plays in IT infrastructure management and monitoring. Successful exploitation results in remote code execution, allowing attackers to gain full control over the affected probe systems. This can lead to unauthorized access to sensitive data, disruption of IT services, and potential compromise of connected networks and endpoints managed through N-central. For European enterprises and managed service providers, this could mean widespread operational disruption, data breaches involving personal or corporate data subject to GDPR, and damage to reputation. The vulnerability's network accessibility and lack of authentication barriers increase the likelihood of exploitation attempts, potentially by cybercriminals or state-sponsored actors targeting critical infrastructure or high-value corporate environments. The threat is particularly acute for sectors with stringent compliance requirements and critical infrastructure dependencies, such as finance, healthcare, telecommunications, and government agencies across Europe.

Mitigation Recommendations

1. Immediate monitoring for unusual deserialization activity or anomalous network traffic targeting N-central probes using advanced intrusion detection systems and endpoint detection and response tools. 2. Implement network segmentation to isolate N-central probes from broader enterprise networks, limiting lateral movement opportunities. 3. Apply strict input validation and filtering at network boundaries to block malformed or suspicious serialized data packets. 4. Prepare for rapid deployment of official patches from N-able once released; establish a patch management plan prioritizing affected systems. 5. Employ application whitelisting and runtime application self-protection (RASP) technologies to prevent unauthorized code execution. 6. Conduct thorough audits of N-central deployments to identify and remediate any legacy or unsupported versions. 7. Engage with N-able support and subscribe to their security advisories for timely updates. 8. Educate IT and security teams on the risks of deserialization vulnerabilities and signs of exploitation attempts. 9. Consider temporary disabling or restricting external network access to N-central probes if feasible until patches are applied. 10. Maintain comprehensive backups and incident response plans tailored to rapid containment and recovery from potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
N-able
Date Reserved
2025-10-06T13:38:53.739Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6914ac61224357dd22f06447

Added to database: 11/12/2025, 3:48:49 PM

Last enriched: 11/12/2025, 4:04:00 PM

Last updated: 11/12/2025, 8:07:54 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats