Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

Posted on August 14, 2025August 14, 2025 By CWS

Aug 14, 2025Ravie LakshmananVulnerability / Community Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added two safety flaws impacting N-able N-central to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.
N-able N-central is a Distant Monitoring and Administration (RMM) platform designed for Managed Service Suppliers (MSPs), permitting prospects to effectively handle and safe their shoppers’ Home windows, Apple, and Linux endpoints from a single, unified platform.
The vulnerabilities in query are listed under –

CVE-2025-8875 (CVSS rating: N/A) – An insecure deserialization vulnerability that would result in command execution
CVE-2025-8876 (CVSS rating: N/A) – A command injection vulnerability through improper sanitization of person enter

Each shortcomings have been addressed in N-central variations 2025.3.1 and 2024.6 HF2 launched on August 13, 2025. N-able can also be urging prospects to ensure that multi-factor authentication (MFA) is enabled, notably for admin accounts.

“These vulnerabilities require authentication to take advantage of,” N-able stated in an alert. “Nonetheless, there’s a potential threat to the safety of your N-central atmosphere, if unpatched. You will need to improve your on-premises N-central to 2025.3.1.”
It is at the moment not identified how the vulnerabilities are being exploited in real-world assaults, in what context, and what’s the scale of such efforts. The Hacker Information has reached out to N-able for remark, and we are going to replace the story if we hear again.
In gentle of energetic exploitation, Federal Civilian Govt Department (FCEB) companies are advisable to use the required fixes by August 20, 2025, to safe their networks.
The event comes a day after CISA positioned two-year-old safety flaws affecting Microsoft Web Explorer and Workplace within the KEV catalog –

CVE-2013-3893 (CVSS rating: 8.8) – A reminiscence corruption vulnerability in Microsoft Web Explorer that enables for distant code execution
CVE-2007-0671 (CVSS rating: 8.8) – A distant code execution vulnerability in Microsoft Workplace Excel that may be exploited when a specifically crafted Excel file is opened to attain distant code execution

FCEB companies have time until September 9, 2025, to replace to the most recent variations, or discontinue their use if the product has reached end-of-life (EoL) standing, as is the case with Web Explorer.

The Hacker News Tags:Adds, Catalog, CISA, Exploited, Flaws, Nable, Ncentral, Vulnerabilities

Post navigation

Previous Post: Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
Next Post: What Is Out-of-Bounds Read and Write Vulnerability?

Related Posts

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation The Hacker News
Bearlyfy Group Intensifies Cyber Attacks on Russian Firms Bearlyfy Group Intensifies Cyber Attacks on Russian Firms The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News
Hackers Target Critical Quest KACE SMA Vulnerability Hackers Target Critical Quest KACE SMA Vulnerability The Hacker News
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The Hacker News
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark