Critical Quest KACE SMA Authentication Bypass (CVE-2025-32975, CVSS 10.0) Now Actively Exploited: Full Administrative Takeover Threatens Managed Endpoints

By Ashish S
 Critical Quest KACE SMA Authentication Bypass (CVE-2025-32975, CVSS 10.0) Now Actively Exploited: Full Administrative Takeover Threatens Managed Endpoints

The Quest KACE Systems Management Appliance remains one of the most widely deployed on-premises endpoint management platforms in education districts, municipal governments, and mid-market enterprises. Its centralized console allows administrators to inventory hardware and software, distribute patches, push custom scripts, enforce security configurations, and remotely control thousands of Windows, macOS, and Linux devices from a single pane of glass. Because the appliance holds domain administrator-equivalent privileges over large fleets of endpoints, any serious flaw in its authentication layer instantly becomes a high-priority target for attackers seeking broad network access.

CVE-2025-32975 is a critical authentication bypass vulnerability that permits completely unauthenticated remote attackers to impersonate any valid user—including the root-level SYSTEM administrator—without ever supplying a password or token. The flaw resides in the way the appliance processes certain single sign-on and session-handling requests. By crafting a specially malformed HTTP request containing manipulated headers and parameters, an attacker can force the system to establish a fully authenticated administrative session. The CVSS v3.1 base score of 10.0 reflects the combination of no authentication required, network attack vector, low complexity, no user interaction needed, and the resulting impact on confidentiality, integrity, and availability of the entire managed environment.

Technical Breakdown of the Authentication Bypass Mechanism

The vulnerability originates from insufficient validation during the handling of authentication callbacks and session cookies in the appliance’s web interface. Specifically, the affected code path fails to properly verify the integrity and origin of certain SAML-like assertions or token parameters when processing requests routed through the /service/ or /admin/ endpoints. Attackers exploit this by sending a POST or GET request with forged values that trick the server into believing the session originates from a trusted internal identity provider or a previously authenticated user. Once the bypass succeeds, the appliance issues a valid session cookie carrying full administrative privileges.

Proof-of-concept exploits shared in underground forums shortly after the May 2025 patch release demonstrated that the attack can be executed using only curl or a simple Python requests script. No browser or JavaScript execution is required, making the vulnerability exceptionally easy to weaponize in automated scanning and exploitation campaigns. Researchers have confirmed that Shodan and Censys queries for exposed KACE SMA instances return thousands of internet-facing appliances, many still running vulnerable builds from 2024 and early 2025.

Post-Exploitation Tactics Observed in Real-World Attacks

After gaining administrative access, attackers immediately focus on persistence and privilege escalation beyond the appliance itself. The KACE SMA includes a built-in agent that runs with SYSTEM privileges on every managed endpoint. Attackers abuse the “Run Now” plugin execution feature or the scripting engine to push malicious PowerShell one-liners or encoded batch files to targeted devices. Common payloads observed in March 2026 incidents include commands that download additional tools via Invoke-WebRequest or bitsadmin from attacker-controlled infrastructure.

One frequently documented sequence involves the creation of rogue local administrator accounts with randomized usernames such as “svc_tempadmin_” followed by eight hexadecimal characters. Attackers then modify the local security policy to grant these accounts remote desktop and scheduled task creation rights. Hidden scheduled tasks are created to execute a secondary stage payload every fifteen minutes, ensuring persistence even if the initial administrative account is disabled. Registry keys under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run are also modified to launch concealed processes at system startup.

Credential access represents the next major phase. Attackers deploy lightweight tools masquerading as legitimate KACE agent components to harvest NTLM hashes, Kerberos tickets, and clear-text credentials from memory. LSASS process dumping via procdump.exe or custom Mimikatz variants has been seen in multiple compromised environments. Harvested credentials are tested immediately against domain controllers and high-value servers such as file shares, backup appliances, and SQL servers. In education sector incidents, attackers have enumerated Active Directory groups containing privileged accounts such as “Domain Admins” and “Enterprise Admins” before attempting pass-the-hash or pass-the-ticket attacks.

Lateral movement leverages the newly acquired credentials and the KACE agent itself. Remote PowerShell sessions are initiated to domain-joined endpoints, RDP connections are established to backup servers, and WMI queries are used to map network shares and enumerate logged-on users. In several documented cases, attackers have used the appliance to deploy legitimate remote management tools such as AnyDesk or TeamViewer under stolen administrative credentials, further blending malicious activity with normal IT operations.

Indicators of Compromise Administrators Should Hunt For

Security teams monitoring KACE SMA instances should search audit and access logs for successful logins originating from unexpected IP addresses, especially those outside the corporate VPN range. Look for HTTP requests to /service/auth or /admin/session endpoints containing unusual User-Agent strings or malformed SAMLResponse parameters. Event logs on the appliance server may show new processes spawned under the SYSTEM account executing powershell.exe, cmd.exe, or curl.exe with suspicious arguments such as -EncodedCommand or -WindowStyle Hidden.

On managed endpoints, hunt for newly created local accounts with names containing random alphanumeric strings, scheduled tasks named in the pattern “WindowsUpdateCheck_” or “SystemMaintenance_”, and registry Run keys pointing to files in %TEMP% or %APPDATA%. Network telemetry may reveal outbound connections from endpoints to previously unknown command-and-control domains shortly after anomalous activity appears on the KACE console. File creation events involving Base64-encoded scripts or .ps1 files in administrative shares should trigger immediate investigation.

Currently Known Affected Versions and Remediation Paths

The following versions remain vulnerable unless the specified patches or later builds have been applied:

  • 13.0 Branch — builds earlier than 13.0.385
  • 13.1 Branch — builds earlier than 13.1.81
  • 13.2 Branch — builds earlier than 13.2.183
  • 14.0 Branch — builds earlier than 14.0.341 Patch 5
  • 14.1 Branch — builds earlier than 14.1.101 Patch 4

Quest released emergency hotfixes in May 2025 followed by cumulative updates that incorporate the authentication hardening changes. Administrators can check the current build number directly from the appliance dashboard under Settings → About. Upgrading requires downloading the latest ISO or patch file from the Quest support portal and following the in-place upgrade wizard. For virtual appliance deployments, snapshots should be taken prior to patching in case rollback becomes necessary.

Hardening Recommendations Beyond Immediate Patching

Even after patching, organizations should implement network-level controls to reduce future risk. Place KACE SMA instances behind strict firewall rules that permit administrative access only from management VLANs or jump servers. Disable or restrict the public-facing web interface entirely if remote administration is not required. Enable detailed logging of all authentication attempts and forward those logs to a central SIEM for correlation with endpoint and network telemetry.

Where supported, configure multi-factor authentication for administrative logins. Regularly review and rotate service accounts used by the KACE agent and limit the scope of endpoints that can receive remote command execution. Conduct periodic external vulnerability scans targeting known management appliance ports (typically 80, 443, and 8080) to identify lingering internet exposure. Finally, test disaster recovery procedures assuming compromise of the central management server, including offline backups of endpoint configurations and credentials.

The speed and scale at which CVE-2025-32975 is being exploited underscore the persistent danger posed by internet-facing management platforms that have not kept pace with security updates. Organizations still running vulnerable builds face an active and credible threat of full administrative takeover followed by rapid lateral movement and potential ransomware deployment.

Ashish S
Ashish S
Ashish is a Cybersecurity Student with over 2 years of experience in Cybersecurity Research, Bug Bounty hunting and programming.