CVE-2025-32977

9.6 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload malicious backup files to Quest KACE Systems Management Appliance due to weaknesses in signature validation. Successful exploitation could compromise system integrity. Affected versions include SMA 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4).

💻 Affected Systems

Products:
  • Quest KACE Systems Management Appliance (SMA)
Versions: 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), 14.1.x before 14.1.101 (Patch 4)
Operating Systems: Appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Unauthorized file upload leading to system manipulation, potential backdoor installation, and privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows remote attackers to target exposed systems directly.
🏢 Internal Only: HIGH - Internal attackers or compromised devices can exploit this without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Technical details and proof-of-concept are publicly available in security advisories. Exploitation requires crafting malicious backup files but is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.0.385, 13.1.81, 13.2.183, 14.0.341 (Patch 5), 14.1.101 (Patch 4)

Vendor Advisory: https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Quest support portal. 2. Apply patch following vendor instructions. 3. Restart the SMA appliance. 4. Verify version is updated.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to SMA appliance to trusted IP addresses only.

Configure firewall rules to allow only specific source IPs to access SMA ports (typically 443/HTTPS)

Disable Unauthenticated Backup Upload

all

If possible, disable backup upload functionality for unauthenticated users via configuration.

Check SMA documentation for disabling specific API endpoints or backup upload features

🧯 If You Can't Patch

  • Isolate SMA appliance in a segmented network with strict access controls
  • Implement web application firewall (WAF) rules to block malicious backup file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check SMA web interface or CLI for current version. Compare against affected versions listed in advisory.

Check Version:

Check via SMA web interface (Admin > About) or SSH to appliance and run: cat /etc/version

Verify Fix Applied:

Verify version number matches patched versions: 13.0.385, 13.1.81, 13.2.183, 14.0.341, or 14.1.101.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated backup upload attempts
  • Failed signature validation logs
  • Unusual file upload activity to backup endpoints

Network Indicators:

  • HTTP POST requests to backup upload endpoints from unauthenticated sources
  • Unusual traffic patterns to SMA appliance

SIEM Query:

source="sma_logs" AND (event="backup_upload" OR event="signature_validation_failed") AND user="unauthenticated"

🔗 References

📤 Share & Export