Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32978: n/a

0
High
VulnerabilityCVE-2025-32978cvecve-2025-32978
Published: Tue Jun 24 2025 (06/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:15:52 UTC

Technical Analysis

CVE-2025-32978 affects multiple versions of Quest KACE Systems Management Appliance (SMA), a widely used endpoint and systems management solution. The vulnerability arises from insufficient access controls on the web interface used for license renewal, allowing unauthenticated users to replace valid system licenses with expired or trial licenses. This unauthorized license replacement effectively disables the appliance’s licensed functionality, causing a denial of service condition. The flaw is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS v3.1 base score of 7.5, indicating high severity. The attack vector is network-based with low attack complexity, requiring no privileges or user interaction, which increases the risk of exploitation. The affected versions include 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4). Although no public exploits have been reported, the vulnerability’s nature suggests that attackers could disrupt enterprise operations by rendering the SMA inoperative through license invalidation. This can impact patch management, asset inventory, and endpoint security enforcement capabilities dependent on the appliance.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those that rely heavily on Quest KACE SMA for centralized systems and endpoint management. Disruption of license validity can lead to loss of critical management functions, delayed patch deployments, and reduced visibility into endpoint security posture. This increases the risk of secondary compromises and operational downtime. Industries with stringent compliance and uptime requirements, such as finance, healthcare, and critical infrastructure, may face regulatory and operational consequences. The denial of service caused by license invalidation could also affect managed service providers (MSPs) using KACE SMA to support multiple clients across Europe, amplifying the impact. Given the appliance’s role in security and systems management, prolonged outages could degrade overall cybersecurity defenses.

Mitigation Recommendations

Organizations should immediately verify their Quest KACE SMA version and apply the appropriate patches: 13.0.385 or later for 13.0.x, 13.1.81 or later for 13.1.x, 13.2.183 or later for 13.2.x, 14.0.341 (Patch 5) or later for 14.0.x, and 14.1.101 (Patch 4) or later for 14.1.x. Until patches are applied, restrict network access to the license renewal web interface using firewall rules or network segmentation to limit exposure to trusted administrators only. Monitor appliance logs for unusual license change attempts and implement alerting for unauthorized access patterns. Review and tighten access controls on management interfaces and consider multi-factor authentication for administrative functions where possible. Regularly audit license status and system health to detect early signs of tampering. Engage with Quest support for guidance on emergency mitigation steps and verify the integrity of licenses post-patch. Additionally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-15T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685ab877af41c610cd96166f

Added to database: 6/24/2025, 2:38:47 PM

Last enriched: 11/4/2025, 2:15:52 AM

Last updated: 11/20/2025, 6:14:55 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats