Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Critical Quest KACE SMA Vulnerability

Hackers Target Critical Quest KACE SMA Vulnerability

Posted on March 23, 2026 By CWS

Cybersecurity experts have raised alarms over a critical vulnerability in Quest KACE Systems Management Appliance (SMA) being actively exploited by hackers. This flaw, identified as CVE-2025-32975 with a CVSS score of 10.0, allows attackers to bypass authentication, posing a significant risk to unpatched systems.

Details of the Vulnerability

Arctic Wolf, a leading cybersecurity firm, detected suspicious activities in early March 2026, indicating that threat actors are leveraging this vulnerability. The exploit allows unauthorized users to impersonate legitimate ones, leading to full administrative control if the system remains unpatched. Quest addressed this issue in May 2025, but many systems appear to be still vulnerable.

The attackers have reportedly used the vulnerability to gain administrative privileges and execute remote commands. They have been observed deploying Base64-encoded payloads through external servers, indicating a well-coordinated attack strategy.

Method of Exploitation

Once in control, the attackers created additional administrative accounts using a process called “runkbot.exe,” associated with the SMA Agent. This allows them to manage installations and execute scripts, further deepening their access. Moreover, Windows Registry changes were made using PowerShell scripts, likely for persistence and configuration manipulation.

Additional malicious activities included harvesting credentials through tools like Mimikatz, and conducting reconnaissance by listing logged-in users and running specific network commands. The attackers also sought remote desktop protocol (RDP) access to key infrastructure components such as backup systems and domain controllers.

Preventive Measures

To mitigate this critical threat, cybersecurity experts strongly advise applying the latest patches provided by Quest. Administrators should ensure that SMA instances are not exposed to the internet. The issue is resolved in software versions 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4).

By implementing these measures, organizations can protect their systems from being compromised by these sophisticated attacks. Continuous monitoring and prompt application of security updates are crucial in maintaining robust cybersecurity defenses.

The Hacker News Tags:authentication bypass, CVE-2025-32975, Cybersecurity, endpoint security, patch update, Quest KACE, security flaw, system management, Threat Actors, Vulnerability

Post navigation

Previous Post: Microsoft Releases Urgent Windows 11 Update for Account Sign-In Bug
Next Post: New Stealth Malware Campaign Targets Key Sectors

Related Posts

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The Hacker News
WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability The Hacker News
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems The Hacker News
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites The Hacker News
Meta Takes Legal Action Against Global Ad Scams Meta Takes Legal Action Against Global Ad Scams The Hacker News
Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CanisterWorm Malware Targets npm, Compromises Developer Accounts
  • Infostealer Attack via Docker Highlights Security Risks
  • New Stealth Malware Campaign Targets Key Sectors
  • Hackers Target Critical Quest KACE SMA Vulnerability
  • Microsoft Releases Urgent Windows 11 Update for Account Sign-In Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CanisterWorm Malware Targets npm, Compromises Developer Accounts
  • Infostealer Attack via Docker Highlights Security Risks
  • New Stealth Malware Campaign Targets Key Sectors
  • Hackers Target Critical Quest KACE SMA Vulnerability
  • Microsoft Releases Urgent Windows 11 Update for Account Sign-In Bug

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark