Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
Overview
Researchers have identified a serious security vulnerability, CVE-2025-32975, affecting the Quest KACE Systems Management Appliance (SMA). This flaw has a maximum severity rating of 10.0 and is being actively exploited by attackers who are targeting unpatched systems exposed to the internet. Malicious activity linked to this vulnerability was first observed during the week of March 9, 2026, according to Arctic Wolf. Organizations using KACE SMA need to take immediate action to protect their systems, as this could lead to unauthorized access and potential data breaches. It’s crucial for users to ensure their systems are updated to mitigate this risk.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Quest KACE Systems Management Appliance (SMA)
- Action Required: Organizations should immediately apply any available patches for Quest KACE SMA.
- Timeline: Ongoing since March 9, 2026
Original Article Summary
Threat actors are suspected to be exploiting a maximum-severity security flaw impacting Quest KACE Systems Management Appliance (SMA), according to Arctic Wolf. The cybersecurity company said it observed malicious activity starting the week of March 9, 2026, in customer environments that's consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. It's
Impact
Quest KACE Systems Management Appliance (SMA)
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Ongoing since March 9, 2026
Remediation
Organizations should immediately apply any available patches for Quest KACE SMA. Users are also advised to restrict access to the SMA from the internet and to implement network segmentation to minimize exposure. Regularly updating systems and monitoring for suspicious activity can help mitigate risks associated with this vulnerability.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Exploit, Vulnerability.