Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11367: CWE-502 Deserialization of Untrusted Data in N-able N-central

0
Critical
VulnerabilityCVE-2025-11367cvecve-2025-11367cwe-502
Published: Wed Nov 12 2025 (11/12/2025, 15:34:54 UTC)
Source: CVE Database V5
Vendor/Project: N-able
Product: N-central

Description

The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via deserialization

AI-Powered Analysis

AILast updated: 11/19/2025, 16:54:57 UTC

Technical Analysis

CVE-2025-11367 is a critical vulnerability affecting N-able's N-central Software Probe versions earlier than 2025.4. The root cause is unsafe deserialization of untrusted data (CWE-502), a common flaw where the application processes serialized objects from untrusted sources without proper validation or sanitization. This flaw enables remote attackers to craft malicious serialized payloads that, when deserialized by the vulnerable N-central probe, lead to arbitrary code execution on the host system. The vulnerability requires no authentication and no user interaction, making it highly exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. N-central is widely used by managed service providers and enterprises for IT infrastructure monitoring and management, meaning exploitation could compromise critical IT operations, data confidentiality, and system integrity. Although no public exploits have been observed yet, the vulnerability's nature and severity suggest that attackers will likely develop exploits rapidly. The lack of available patches at the time of disclosure increases urgency for organizations to monitor vendor updates closely and implement interim mitigations.

Potential Impact

The impact on European organizations is potentially severe. Successful exploitation allows attackers to execute arbitrary code remotely on systems running the vulnerable N-central probe, leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of IT management operations, and potential lateral movement within enterprise networks. Managed service providers using N-central could inadvertently become attack vectors for their clients, amplifying the threat. Critical infrastructure and enterprises relying on N-central for monitoring and automation may face operational outages, data breaches, and reputational damage. Given the criticality and ease of exploitation, the vulnerability poses a significant risk to confidentiality, integrity, and availability of IT environments across Europe.

Mitigation Recommendations

1. Monitor N-able’s official channels for the release of patches addressing CVE-2025-11367 and apply updates immediately upon availability. 2. Until patches are available, restrict network access to N-central probes by implementing strict firewall rules limiting inbound connections to trusted management networks only. 3. Employ network segmentation to isolate N-central probes from critical systems and sensitive data repositories. 4. Use intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous deserialization payloads or suspicious network activity targeting N-central services. 5. Conduct thorough audits of N-central deployments to identify exposed instances and verify current software versions. 6. Implement application-layer filtering or web application firewalls (WAFs) capable of detecting and blocking malicious serialized data patterns. 7. Educate IT and security teams about the risks of deserialization vulnerabilities and encourage proactive threat hunting for signs of exploitation attempts. 8. Prepare incident response plans specifically addressing potential compromises of N-central infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
N-able
Date Reserved
2025-10-06T13:38:53.739Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6914ac61224357dd22f06447

Added to database: 11/12/2025, 3:48:49 PM

Last enriched: 11/19/2025, 4:54:57 PM

Last updated: 12/27/2025, 11:21:34 PM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats