Quest KACE SMA Vulnerability Exposes Admin Accounts – CVE-2023-12975 Exploited
Admin Account Hijacking Exposes Critical Vulnerability in Quest KACE SMA
In a recent wave of attacks, hackers have exploited a previously patched vulnerability in Quest KACE Systems Management Appliance (SMA) to hijack administrative accounts on unsecured systems. The campaign, which began in early March 2026, leverages the CVE-2025-32975 flaw to execute remote commands, steal credentials, and facilitate lateral movement, underscoring the importance of timely patching and vigilant security measures.
Furthermore, malicious activities observed during the attacks include:
- Credential theft via Mimikatz to extract login details
- Discovery and reconnaissance through enumeration of logged-in users and admin accounts, as well as execution of “net time” and “net group” commands
- Remote access to backup infrastructure, including Veeam and Veritas, as well as domain controllers
Regularly checking agent and backup services and reporting any unusual activity promptly are also essential steps in preventing further unauthorized access. By taking these precautions, organizations can mitigate the risk of such attacks and ensure the integrity of their systems.