A critical authentication bypass vulnerability in the Quest KACE Systems Management Appliance (SMA), tracked as CVE-2025-32975, is now under active exploitation, nearly a year after a patch was released. The vulnerability, which carries a perfect CVSS score of 10.0, allows a remote, unauthenticated attacker to completely take over an unpatched, internet-facing KACE SMA instance. Security firm Arctic Wolf reported observing attacks beginning in early March 2026 where threat actors exploited this flaw to gain initial administrative access. Post-exploitation activities include deploying the credential dumper Mimikatz, creating persistent admin accounts, and moving laterally to compromise domain controllers and backup servers. This campaign serves as a stark reminder that legacy vulnerabilities remain a significant threat, and organizations are strongly urged to ensure their KACE SMA instances are patched and isolated from the internet.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HBecause the KACE SMA is a centralized tool for managing endpoints—handling asset inventory, software distribution, and patching—its compromise provides a powerful foothold for attackers to control an entire fleet of corporate devices.
As of March 2026, active exploitation has been confirmed in the wild by Arctic Wolf. The attacks appear to be opportunistic, targeting any unpatched KACE SMA appliance that is discoverable on the internet. While some victims were in the education sector, the threat is not limited to any specific vertical.
T1190 - Exploit Public-Facing Application).T1078.001 - Default Accounts).T1003.001 - OS Credential Dumping: LSASS Memory).T1021.002 - Remote Services: SMB/Windows Admin Shares).Mimikatz or other credential dumping tools on the KACE server or other endpoints.Applying the patch from May 2025 is the definitive fix for the vulnerability.
Removing the KACE SMA from public internet exposure is a critical compensating control that prevents external exploitation.
Auditing for and removing rogue administrative accounts helps to evict attackers and remediate the compromise.
The active exploitation of CVE-2025-32975 underscores a fundamental security failure: exposing management appliances to the public internet. The most effective mitigation, beyond patching, is to enforce strict network isolation for the Quest KACE SMA. This appliance should never be directly accessible from the internet. It should be located on a secure management VLAN, with firewall rules that deny all inbound connections from external IP addresses. Access should be restricted to internal administrative staff via a VPN or a secure jump host. This single architectural change would have prevented this entire attack chain by making the vulnerable appliance unreachable to the external threat actors who are opportunistically scanning the internet for it. This is a critical hardening step for all internal management infrastructure.
This incident highlights the long tail of risk from unpatched vulnerabilities. A patch for this 10.0 CVSS flaw has been available for nearly a year. Organizations must have a robust and comprehensive patch management program that ensures all assets, including infrastructure appliances like the KACE SMA, are patched in a timely manner. Use authenticated vulnerability scanning to continuously assess the patch status of all systems. For a vulnerability this critical, patching should have been completed on an emergency basis in May 2025. Any organization still running a vulnerable version must treat this as a critical security failure and immediately apply the update. After patching, it is essential to assume compromise and initiate a threat hunt for the TTPs described, such as rogue admin accounts and signs of lateral movement.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats