CVE-2025-32975: n/a
CVE-2025-32975 is a critical authentication bypass vulnerability in Quest KACE Systems Management Appliance (SMA) versions prior to specified patch levels. It affects the SSO authentication handling mechanism, allowing attackers to impersonate legitimate users without valid credentials. Successful exploitation can lead to complete administrative takeover of the appliance. The vulnerability has a CVSS score of 10. 0, indicating high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet. Patch status is not confirmed in the provided data, so users should consult the vendor advisory for remediation guidance.
AI Analysis
Technical Summary
Quest KACE SMA versions 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contain an authentication bypass vulnerability in the SSO authentication mechanism. This flaw allows attackers to bypass authentication controls and impersonate legitimate users without valid credentials, potentially resulting in full administrative control over the appliance. The vulnerability is tracked as CVE-2025-32975 and is classified under CWE-287 (Improper Authentication). It has a CVSS v3.1 base score of 10.0, reflecting network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability.
Potential Impact
Exploitation of this vulnerability can lead to complete administrative takeover of the affected Quest KACE SMA appliance. This includes unauthorized access and control over system functions, potentially compromising all managed endpoints and sensitive data within the management environment. The critical CVSS score of 10.0 reflects the severity and ease of exploitation without authentication or user interaction.
Mitigation Recommendations
Patch status is not confirmed in the provided data. Users should immediately consult the official Quest KACE vendor advisory to obtain the latest patches or updates addressing this vulnerability. Until patches are applied, restrict access to the appliance's management interfaces and monitor for suspicious activity related to authentication bypass attempts. Do not rely on generic mitigations; follow vendor-specific guidance once available.
CVE-2025-32975: n/a
Description
CVE-2025-32975 is a critical authentication bypass vulnerability in Quest KACE Systems Management Appliance (SMA) versions prior to specified patch levels. It affects the SSO authentication handling mechanism, allowing attackers to impersonate legitimate users without valid credentials. Successful exploitation can lead to complete administrative takeover of the appliance. The vulnerability has a CVSS score of 10. 0, indicating high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet. Patch status is not confirmed in the provided data, so users should consult the vendor advisory for remediation guidance.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Quest KACE SMA versions 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contain an authentication bypass vulnerability in the SSO authentication mechanism. This flaw allows attackers to bypass authentication controls and impersonate legitimate users without valid credentials, potentially resulting in full administrative control over the appliance. The vulnerability is tracked as CVE-2025-32975 and is classified under CWE-287 (Improper Authentication). It has a CVSS v3.1 base score of 10.0, reflecting network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability.
Potential Impact
Exploitation of this vulnerability can lead to complete administrative takeover of the affected Quest KACE SMA appliance. This includes unauthorized access and control over system functions, potentially compromising all managed endpoints and sensitive data within the management environment. The critical CVSS score of 10.0 reflects the severity and ease of exploitation without authentication or user interaction.
Mitigation Recommendations
Patch status is not confirmed in the provided data. Users should immediately consult the official Quest KACE vendor advisory to obtain the latest patches or updates addressing this vulnerability. Until patches are applied, restrict access to the appliance's management interfaces and monitor for suspicious activity related to authentication bypass attempts. Do not rely on generic mitigations; follow vendor-specific guidance once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-15T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 685ab877af41c610cd961665
Added to database: 6/24/2025, 2:38:47 PM
Last enriched: 4/28/2026, 6:09:06 AM
Last updated: 5/9/2026, 3:51:19 AM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.