when one unpatched tool opens the door to 60 organizations


Quest KACE SMA flaw CVE-2025-32975: when one unpatched tool opens the door to 60 organizations

Pierluigi Paganini
May 13, 2026

CVE-2025-32975 is a critical flaw in Quest KACE SMA used for endpoint management. If exploited, it could impact all managed systems across organizations.

CVE-2025-32975 is a critical flaw in Quest KACE SMA used for endpoint management. If exploited, it could impact all managed systems across organizations.

Quest KACE SMA is an on-premises endpoint management platform for software deployment, patching, and device control. Its central role makes it a high-value target, as compromise can expose all managed endpoints.

CVE-2025-32975 is a critical authentication bypass vulnerability in KACE SMA’s SSO authentication handling mechanism with a CVSS score of 10.0.” reads the report published by Hunt.io. “The flaw allows an unauthenticated, network-reachable attacker to impersonate legitimate users, including administrators, without supplying any credentials.”

There is a particular kind of dread that comes with reading an incident report where you realize the attacker did not need to be clever. They just needed to be patient — and wait for someone to forget to patch.

That is essentially the story behind CVE-2025-32975, a critical vulnerability in Quest KACE Systems Management Appliance, a tool used by IT teams across thousands of organizations to manage software, push patches, and control endpoints from a single console. It is precisely the kind of tool that, when compromised, does not just affect the company running it. It affects every organization whose devices that console manages.

The vulnerability itself is as bad as it gets on paper: a CVSS score of 10.0, which is the maximum possible. Quest published a fix in May 2025. Ten months later, attackers were actively exploiting instances that had never been updated.

What made this case unusually revealing was not just the breach itself, but a mistake the attacker made afterward. After compromising a managed services provider called HIQ, which handled IT for dozens of organizations across the Boston area, the attacker staged their entire toolkit on a server with no password protection on the directory. Hunt.io’s scanning infrastructure caught it three days into the operation, in full public view, sitting on a plain HTTP server anyone could browse.

“The 308 MB toolkit covers the full intrusion lifecycle across 219 files, including reverse shells, a bidirectional C2 file server, account creation, an SMB credential sprayer, WMI reconnaissance, and a custom TCP-multiplexed SOCKS5 tunnel for persistent, covert network access.” continues the report.

This was not the work of a casual opportunist. The toolkit was organized, functional, and covered every phase of a professional intrusion — from the first shell access all the way to maintaining a persistent, hidden channel through the victim’s network.

The depth of what was then extracted makes for uncomfortable reading. The attacker pulled a 512 MB database dump from the KACE appliance, which turned out to contain the complete operational picture of HIQ’s IT business: staff accounts, client lists, helpdesk tickets describing work done at police departments, schools, healthcare organizations, and local government agencies.

“The exfiltrated MariaDB dump reveals the appliance-managed endpoints for over 60 named client organizations spanning law enforcement, government, healthcare, education, and the private sector.” states Hunt.io.

None of those 60-plus organizations had anything to do with KACE. They were clients of the MSP that used it. This is the supply chain risk that keeps security teams awake: you can do everything right within your own walls and still end up in someone’s database dump because a vendor you trusted was running unpatched software.

There are also traces in the toolkit pointing to at least two other victims beyond HIQ. A reconnaissance script contained hardcoded credentials for an Indonesian insurance company, suggesting those had already been harvested from a separate, earlier compromise and were being reused for further lateral movement.

The attacker also used Tor Browser and an encrypted messenger for anonymity, and metadata inside two Windows shortcut files placed them on a rented VPS running Windows Server 2019 — a rented machine with an auto-generated hostname, the kind you spin up for an operation and discard.

“Hunt.io’s scan data shows more than 12,000 K1000 appliances currently internet-facing and disclosing version strings that predate the patch, across standard and non-standard ports.”

Twelve thousand. And hiding the appliance on a non-standard port, it turns out, does nothing to prevent detection.

The lesson here is not complicated. A maximum-severity authentication bypass, left unpatched for ten months on an internet-exposed management platform, led to the exposure of over sixty downstream organizations — law enforcement, hospitals, schools — none of whom ever touched the vulnerable software. The attacker’s toolkit was sophisticated. The initial access was not. It was a login screen with no lock on it, waiting for someone to walk through.

If your organization uses KACE SMA, the patch has existed since May 2025. The question is simply whether you have applied it.

The researchers also published Indicators of Compromise (IoCs).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Quest KACE SMA)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


When you pick out a phone, you’re also picking out the operating system—that typically means Android or iOS. What if a phone didn’t follow those rules? What if it could run any OS you wanted? This is the story of the legendary HTC HD2.

Microsoft makes a mess with Windows Mobile

The HD2 arrives at an unfortunate time

windows mobile 6.5 Credit: Pocketnow

Officially, the HTC HD2 (HTC Leo) launched in November 2009 with Windows Mobile 6.5. Microsoft had already been working on Windows Phone for a few years at this point, and it was planned to be released in 2009. However, multiple delays forced Microsoft to release Windows Mobile 6.5 as a stopgap update to Windows Mobile 6.1.

Microsoft’s plan for mobile devices was a mess at this time. The HD2 didn’t launch in North America until March 2010—one month after Windows Phone 7 had been announced at Mobile World Congress. Originally, the HD2 was supposed to be upgraded to Windows Phone 7, but Microsoft later decided no Windows Mobile devices would get the new OS.

This left the HD2 stuck between a rock and a hard place. Launched as the final curtain was dropping on one OS, but too early to be upgraded to the next OS. Thankfully, HTC was not just any manufacturer, and the HD2 was not just any phone.

The HD2 was better than it had any right to be

HTC made a beast of a phone

HTC HD2 Credit: HTC

HTC was one of the best smartphone manufacturers of the late 2000s and 2010s. It manufactured the first Android phone, the first Google Pixel phone, and several of the most iconic smartphones of the last two decades. Much of the company’s reputation for premium, high-quality hardware stems from the HD2.

The HD2 was the first smartphone with a 4.3-inch touchscreen—considered huge at the time—and one of the first smartphones with a 1 GHz Qualcomm Snapdragon processor. That processor, along with 512GB of RAM, made the HD2 more future-proof than HTC probably ever intended. Phones would be launching with those same specs for the next couple of years.

For all intents and purposes, the HD2 was the most powerful phone on the market. It just so happened to run the most limiting mobile OS of the time. If the software situation could be improved, there was clearly tons of potential.

The phone that could do it all

Android, Windows Phone, Ubuntu, and more

The key to the HD2’s hackability was HTC’s open design philosophy. It had an easily unlockable bootloader, and it could boot operating systems from the NAND flash and SD cards.

First, the community took to righting a wrong and bringing Windows Phone 7 to the HD2. This was thanks to a custom bootloader called “MAGLDR”—Windows Phone 7.5 and 8 would eventually get ported, too. The floodgates had opened, and Windows Phone was the least of what this beast of a phone could do.

Android on the HTC HD2? No problem. Name a version of the OS, and the HD2 had a port of it: 2.2 Froyo, 2.3 Gingerbread, 4.0 Ice Cream Sandwich, 4.1/2/3 Jelly Bean, 4.4 Kitkat, 5.0 Lollipop, 6.0 Marshmallow, 7.0 Nougat, and 8.1 Oreo. Yes, the HD2 was still getting ports seven years after it launched.

But why stop at Android? The HD2 was ripe for all sorts of Linux builds. Ubuntu—including Ubuntu Touch—, Debian, Firefox OS, and Nokia’s MeeGo were ported as well. The cool thing about the HD2 was that it could dual-boot OS’. You didn’t have to commit to just one system at a time. It was truly like having a PC in your pocket, and the tech community loved it.

Do a web search for “HTC HD2” now, and you’ll find many articles about the phone getting yet another port of an OS. It became a running joke that the HD2 would get new versions of Android before officially supported Android phones did. People called it “the phone that refuses to die,” but it was the community that kept it alive.

The last of its kind

“They don’t make ‘em like they used to”

HTC HD2 close up Credit: TechRepublic

The HTC HD2 was a phone from a very different time. It may have gotten more headlines, but there were plenty of other phones being heavily modded and unofficially upgraded back then. Unlockable bootloaders were much more common, and that created opportunities for enthusiasts.

I can attest to how different it was in the early years of the smartphone boom. My first smartphone was another HTC device, the DROID Eris from Verizon. I have fond memories of scouring the XDA-Developers forums for custom ROMs and installing the latest Kaos builds on a whim during college lectures. Sadly, it’s been many years since I attempted that level of customization.

It’s not all doom and gloom for modern smartphones, though. Long-term support has gotten considerably better than it was back in 2010. As mentioned, the HD2 never officially received Windows Phone 7, and it never got any other updates, either. My DROID Eris stopped getting updates a mere eight months after release.

Compare that to phones such as the Samsung Galaxy S26, Google Pixel 10, and iPhone 17, which will all be supported through 2032. You may not be able to dual-boot a completely different OS on these phones, but they won’t be dead in the water in less than a year. We will likely never see a phone like the HTC HD2 from a major manufacturer again.

HTC Droid Eris


A Love Letter to My First Smartphone, the HTC Droid Eris

No, not that DROID.



Source link