Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Attacks Exploiting N-able Vulnerabilities

CISA Warns of Attacks Exploiting N-able Vulnerabilities

Posted on August 14, 2025August 14, 2025 By CWS

The cybersecurity company CISA is warning organizations that use the N-central distant monitoring and administration (RMM) product from N-able about two just lately patched vulnerabilities being exploited within the wild.

N-central is designed to offer administration, automation, and orchestration capabilities to MSPs and IT groups.

N-able knowledgeable clients on August 13 {that a} new model of the product, 2025.3, features a “vital safety repair” for 2 vulnerabilities tracked as CVE-2025-8875 and CVE-2025-8876. 

“These vulnerabilities require authentication to use. Nevertheless, there’s a potential threat to the safety of your N-central surroundings, if unpatched,” the seller mentioned.

CVE-2025-8875 has been described as an insecure deserialization difficulty, whereas CVE-2025-8876 is a command injection flaw. N-able mentioned particulars shall be made out there after three weeks.

N-able’s advisory doesn’t point out in-the-wild exploitation of the failings, however CISA has added them to its Recognized Exploited Vulnerabilities (KEV) catalog. The company has instructed authorities organizations to patch the safety holes by August 20.

Contemplating that CISA added them to its KEV catalog on the identical day they had been disclosed, and contemplating that no technical data or PoC exploits seem like publicly out there, it’s attainable that the failings have been exploited as zero-days. 

Business professionals have warned that given N-central’s use by MSPs, risk actors may exploit the vulnerabilities to entry MSP clients’ environments. Commercial. Scroll to proceed studying.

It’s price noting that N-able was created in 2021 as a spin-off of SolarWinds, which in 2020 was focused in a high-impact provide chain assault. 

SecurityWeek has reached out to N-able for remark and can replace this text if the corporate responds.

Associated: CISA Warns of SysAid Vulnerability Exploitation

Associated: CitrixBleed 2 Flaw Poses Unacceptable Danger: CISA

Associated: CISA Warns of Two Exploited TeleMessage Vulnerabilities

Security Week News Tags:Attacks, CISA, Exploiting, Nable, Vulnerabilities, Warns

Post navigation

Previous Post: Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
Next Post: SmartLoader Malware via Github Repository as Legitimate Projects Infection Users Computer

Related Posts

Cloaked Secures 5M to Boost Privacy Tools and Enterprise Expansion Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion Security Week News
Upwind Raises 0 Million at .5 Billion Valuation Upwind Raises $250 Million at $1.5 Billion Valuation Security Week News
Empirical Security Raises  Million for AI-Driven Vulnerability Management Empirical Security Raises $12 Million for AI-Driven Vulnerability Management Security Week News
The AI Arms Race: Deepfake Generation vs. Detection The AI Arms Race: Deepfake Generation vs. Detection Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News
Bipartisan Bill Aims to Block Chinese AI From Federal Agencies Bipartisan Bill Aims to Block Chinese AI From Federal Agencies Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark