CVE-2025-11700

7.5 HIGH
XXE

📋 TL;DR

N-central versions before 2025.4 are vulnerable to XML External Entity (XXE) injection attacks, allowing attackers to read arbitrary files from the server. This affects organizations using N-central for remote monitoring and management.

💻 Affected Systems

Products:
  • N-central
Versions: All versions < 2025.4
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with default XML parsing configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system disclosure including sensitive configuration files, credentials, and system data leading to full compromise.

🟠

Likely Case

Partial information disclosure of accessible files, potentially exposing configuration data and sensitive information.

🟢

If Mitigated

Limited or no data exposure if proper XML parsing configurations are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires ability to submit XML data to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.4

Vendor Advisory: https://me.n-able.com/s/security-advisory/aArVy0000000rabKAA

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download N-central 2025.4 from vendor portal. 3. Run installer with administrative privileges. 4. Restart all N-central services.

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure XML parsers to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, DISALLOW_DOCTYPE_DECL=true

🧯 If You Can't Patch

  • Implement strict input validation for all XML inputs
  • Deploy WAF with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check N-central version in admin interface or via 'n-central --version' command

Check Version:

n-central --version

Verify Fix Applied:

Confirm version is 2025.4 or higher and test XXE payloads are rejected

📡 Detection & Monitoring

Log Indicators:

  • XML parsing errors
  • File access attempts via XML endpoints
  • Unusual XML payload sizes

Network Indicators:

  • XML requests with DOCTYPE declarations
  • External entity references in XML

SIEM Query:

source="n-central" AND (xml OR xxe OR doctype)

🔗 References

📤 Share & Export