Security researchers have warned that a critical vulnerability, CVE-2025-32975, affecting the Quest Software KACE Systems Management Appliance (SMA), is being actively exploited in the wild. The flaw carries a CVSS score of 10.0, the highest possible severity, making it extremely dangerous for enterprises using the platform.

The vulnerability is an authentication bypass flaw in the SMA login mechanism. Exploitation could allow attackers to access the system without valid credentials, giving them administrative-level privileges, the ability to move laterally across networks, and potential access to sensitive enterprise data.

According to researchers, the flaw is particularly serious because it requires no authentication and no user interaction, making it easy for attackers to exploit remotely. Early reports suggest that threat actors are already targeting exposed KACE SMA instances. Organizations using affected versions could face unauthorized access to internal systems, exposure of sensitive information, and disruption of IT operations.

The vulnerability affects multiple KACE SMA versions, including older and some recent releases. Quest Software has released security patches to fix CVE-2025-32975 and strongly urges all users to update immediately. Organizations are also advised to restrict external access to management interfaces, enable multi-factor authentication (MFA), and monitor system logs for suspicious activity. Prompt patching is essential to prevent potential exploitation that could result in complete system compromise.

With a CVSS score of 10.0, the flaw represents a maximum-risk vulnerability. Authentication bypass bugs are especially dangerous because they allow attackers to bypass standard security protections. Security teams must act quickly to apply patches, secure administrative access, and monitor networks to prevent unauthorized access and potential data breaches.

Don’t miss updates! Follow us on Twitter & Facebook. 🔔