Changeflow GovPing Data Privacy & Cybersecurity Quest KACE SMA Authentication Bypass Vulnerabil...
Priority review Notice Added Final

Quest KACE SMA Authentication Bypass Vulnerability CVE-2025-32975

Email

Summary

CISA added CVE-2025-32975 to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability affects Quest KACE Systems Management Appliance versions 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4). The flaw is an authentication bypass in the SSO authentication handling mechanism allowing attackers to impersonate legitimate users without valid credentials, enabling complete administrative takeover. The CVSS score is 10.0 (CRITICAL) and SSVC classification is active exploitation, automatable, with total technical impact.

“Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials.”

MITRE , verbatim from source
Published by MITRE on cve.org . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CISA catalogued CVE-2025-32975 as a Known Exploited Vulnerability, signalling active exploitation of a critical authentication bypass in Quest KACE Systems Management Appliance. The vulnerability carries a CVSS 3.1 score of 10.0 (CRITICAL) across all attack vectors — network-accessible, low complexity, no privileges required, no user interaction needed — with total confidentiality, integrity, and availability impact.

Organizations running affected Quest KACE SMA versions should prioritize patching to the specified patch levels. Inclusion in the CISA KEV catalog indicates evidence of active exploitation in the wild, which may trigger compliance obligations under federal cybersecurity directives for government-connected systems.

Archived snapshot

Apr 21, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Required CVE Record Information

CNA: MITRE Corporation

Updated:

2025-06-24

Description

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover.

Product Status

Learn more Information not provided

References 3 Total

CVE Program

References 1 Total

Authorized Data Publishers

Learn more

CISA-ADP

SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

SSVC 1 Total

Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | total | 2.0.3 | 2026-04-20 |

KEV 1 Total

Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32975 (2026-04-20)

CWE 1 Total

Learn more
- CWE-287: CWE-287 Improper Authentication

CVSS 1 Total

Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 10.0 | CRITICAL | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |

Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from MITRE.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
MITRE
Instrument
Notice
Branch
Executive
Joint with
CISA
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Government agencies Organizations using Quest KACE SMA
Industry sector
5112 Software & Technology
Activity scope
Authentication bypass vulnerability SSO mechanism exploitation Administrative system access
Geographic scope
United States US

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Information Security Data Privacy Network Security

Get alerts for this source

We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!