Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
    Cybersecurity

    Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

    adminBy adminMarch 23, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 23, 2026Vulnerability / Endpoint Security

    Threat actors are suspected to be exploiting a maximum-severity security flaw impacting Quest KACE Systems Management Appliance (SMA), according to Arctic Wolf.

    The cybersecurity company said it observed malicious activity starting the week of March 9, 2026, in customer environments that’s consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. It’s currently not known what the end goals of the attack are.

    CVE-2025-32975 (CVSS score: 10.0) refers to an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. Successful exploitation of the flaw could facilitate the complete takeover of administrative accounts. The issue was patched by Quest in May 2025.

    In the malicious activity detected by Arctic Wolf, threat actors are believed to have weaponized the vulnerability to seize control of administrative accounts and execute remote commands to drop Base64-encoded payloads from an external server (216.126.225[.]156) via the curl command.

    The unknown attackers then proceeded to create additional administrative accounts via “runkbot.exe,” a background process associated with the SMA Agent that’s used to run scripts and manage installations. Also detected were Windows Registry modifications via a PowerShell script for possible persistence or system configuration changes.

    Other actions undertaken by the threat actors are listed below –

    • Conducting credential harvesting using Mimikatz.
    • Performing discovery and reconnaissance by enumerating logged-in users and administrator accounts, and running “net time” and “net group” commands.
    • Obtaining remote desktop protocol (RDP) access to backup infrastructure (Veeam, Veritas) and domain controllers.

    To counter the threat, administrators are advised to apply the latest updates and avoid exposing SMA instances to the internet. The issue has been addressed in versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4).

    CVE202532975 CVSS exploit hackers Hijack KACE Quest SMA Systems Unpatched
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYour AI agents are moving sensitive data. Do you know where?
    Next Article After the Galaxy S26 Ultra, Samsung may finally speed up charging on its foldables
    admin
    • Website

    Related Posts

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,340)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (821)
    • Tech Tools & Mobile / Apps (1,603)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026
    Most Popular
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    • NYT Strands hints and answers for Thursday, April 16 (game #774)
    • The Modern SEO Center Of Excellence: Governance, Not Guidelines
    • Raspberry Pi OS is getting a new security measure, and people are already annoyed
    • April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
    • YouTube Premium is now 50% off for certain Google One subscribers
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.