Skip to main content

CVE-2025-26850: CWE-863 Incorrect Authorization in Quest KACE Systems Management Appliance

Critical
VulnerabilityCVE-2025-26850cvecve-2025-26850cwe-863
Published: Fri Jul 04 2025 (07/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Quest
Product: KACE Systems Management Appliance

Description

The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:39:51 UTC

Technical Analysis

CVE-2025-26850 is a critical security vulnerability identified in the Quest KACE Systems Management Appliance (SMA), specifically affecting versions prior to 14.0.97 and 14.1.x before 14.1.19. The vulnerability is classified under CWE-863, which corresponds to Incorrect Authorization. This flaw resides in the agent component of the KACE SMA, which is responsible for managing and administering endpoints within an enterprise environment. Due to improper authorization checks, an attacker can exploit this vulnerability to escalate privileges on managed systems without requiring prior authentication or user interaction. The CVSS v3.1 base score of 9.3 reflects the severity and ease of exploitation: the attack vector is local (AV:L), attack complexity is low (AC:L), no privileges are required (PR:N), and no user interaction is necessary (UI:N). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can gain elevated privileges, potentially full administrative control, on managed endpoints, leading to unauthorized access, data compromise, and disruption of services. Although no known exploits are currently reported in the wild, the critical nature of this vulnerability and the widespread use of KACE SMA in enterprise environments make it a significant threat. The lack of publicly available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor for updates from the vendor. Given that KACE SMA is widely used for endpoint management, this vulnerability could be leveraged to compromise large numbers of managed devices, facilitating lateral movement, data exfiltration, or deployment of ransomware within affected networks.

Potential Impact

For European organizations, the impact of CVE-2025-26850 is substantial due to the critical role KACE SMA plays in endpoint management and system administration. Successful exploitation could allow attackers to gain administrative privileges on managed systems, bypassing existing security controls. This could lead to unauthorized access to sensitive data, disruption of business operations, and potential compliance violations under regulations such as GDPR. The ability to escalate privileges without authentication or user interaction increases the risk of rapid compromise and lateral movement within corporate networks. Organizations in sectors with high regulatory and operational sensitivity—such as finance, healthcare, government, and critical infrastructure—face heightened risks. Additionally, the potential for attackers to deploy malware or ransomware at scale through compromised management appliances could result in significant financial and reputational damage. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity score underscores the need for immediate attention.

Mitigation Recommendations

1. Immediate patching: Organizations should prioritize updating Quest KACE SMA to versions 14.0.97 or later, or 14.1.19 or later as soon as vendor patches become available. 2. Restrict local access: Limit local access to the KACE SMA agent and management consoles to trusted administrators only, using network segmentation and strict access controls. 3. Monitor and audit: Implement enhanced logging and monitoring on KACE SMA appliances and managed endpoints to detect unusual privilege escalation attempts or unauthorized access patterns. 4. Harden endpoint security: Employ endpoint detection and response (EDR) solutions to identify and block suspicious activities related to privilege escalation. 5. Network segmentation: Isolate management appliances and critical infrastructure from general user networks to reduce the attack surface. 6. Incident response readiness: Prepare and test incident response plans specifically addressing potential exploitation of management appliance vulnerabilities. 7. Vendor communication: Maintain close contact with Quest for timely updates, patches, and advisories related to this vulnerability. 8. Temporary compensating controls: Until patches are applied, consider disabling or restricting vulnerable agent functionalities if feasible, or deploying host-based access controls to limit exploitation potential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686862ac6f40f0eb72a3fa88

Added to database: 7/4/2025, 11:24:28 PM

Last enriched: 7/4/2025, 11:39:51 PM

Last updated: 7/4/2025, 11:39:51 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats