ANAVEM
Languagefr
Server room with red emergency lighting and network equipment racks

Quest KACE CVE-2025-32975 Exploited in Education Attacks

Critical Quest KACE vulnerability CVE-2025-32975 has been actively exploited in targeted attacks against educational institutions worldwide.

21 March 2026, 12:00 5 min read

Last updated 21 March 2026, 21:00

SEVERITYCritical
CVE IDCVE-2025-32975
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORQuest Software
AFFECTEDKACE Systems Management Applia...
CATEGORYVulnerabilities

Key Takeaways

Quest KACE CVE-2025-32975 Enables Remote Code Execution

Quest Software disclosed a critical vulnerability in its KACE Systems Management Appliance platform on March 20, 2026, warning that attackers have already weaponized the flaw in targeted campaigns against educational organizations. The vulnerability, tracked as CVE-2025-32975, affects multiple versions of the KACE platform and enables remote code execution without authentication.

Security researchers first identified suspicious activity targeting KACE deployments in late February 2026, with initial indicators pointing to exploitation of an unknown vulnerability in the web management interface. Quest's security team confirmed the vulnerability after analyzing attack patterns and working with affected customers to understand the exploitation mechanism. The company's investigation revealed that attackers were leveraging improper input validation in the KACE web console to execute arbitrary commands on underlying systems.

The vulnerability stems from insufficient sanitization of user-supplied data in the KACE web application's file upload functionality. Attackers can craft malicious requests that bypass authentication checks and execute system-level commands with elevated privileges. This design flaw allows complete compromise of affected KACE appliances, giving attackers persistent access to managed endpoints and sensitive configuration data.

Quest Software has confirmed that the vulnerability affects KACE Systems Management Appliance versions 13.0 through 13.2.145, as well as KACE Systems Deployment Appliance versions 8.0 through 8.2.157. The company released emergency patches for all affected versions on March 20, 2026, and has been working directly with customers to coordinate rapid deployment of security updates.

Related: Veeam Patches Four Critical RCE Flaws in Backup Software

Related: CISA Orders Federal Agencies to Patch n8n RCE Flaw

Related: Oracle Patches Critical RCE Flaw in Identity Manager

Related: CISA Warns of Actively Exploited Wing FTP Server Flaw

Related: Langflow CVE-2026-33017 Exploited 20 Hours After Disclosure

According to Quest's advisory, the vulnerability requires network access to the KACE web interface but doesn't require valid credentials, making it particularly dangerous for organizations that expose their KACE appliances to the internet or have compromised internal networks. The CISA Known Exploited Vulnerabilities catalog is expected to add CVE-2025-32975 following confirmation of active exploitation.

Educational Institutions Face Targeted KACE Exploitation

The active exploitation campaign has primarily targeted educational institutions across North America and Europe, with Quest Software confirming attacks against at least twelve school districts and universities. These organizations typically deploy KACE appliances to manage large fleets of student and faculty devices, making them attractive targets for attackers seeking to establish persistent access to educational networks.

Organizations running Quest KACE Systems Management Appliance versions 13.0 through 13.2.145 are vulnerable to exploitation, along with those using KACE Systems Deployment Appliance versions 8.0 through 8.2.157. The vulnerability affects both on-premises and cloud-hosted KACE deployments, though cloud instances may have additional network protections that limit exposure. Quest estimates that approximately 3,000 organizations worldwide operate vulnerable KACE appliances, with educational institutions representing roughly 40% of the affected user base.

The education sector's vulnerability stems from common deployment patterns that increase exposure risk. Many schools configure KACE appliances with internet-facing management interfaces to support remote device management and software deployment. Additionally, educational networks often have complex trust relationships and shared access policies that can amplify the impact of a successful KACE compromise. Attackers who gain control of KACE appliances can potentially access managed endpoints, steal credentials, and move laterally through connected systems.

Beyond educational institutions, the vulnerability also affects corporate environments, government agencies, and healthcare organizations that rely on KACE for endpoint management. The Microsoft Security Response Center has noted increased scanning activity targeting KACE appliances, suggesting that threat actors are actively searching for vulnerable systems across multiple sectors.

Immediate Patching Required for Quest KACE Systems

Quest Software has released security updates that address CVE-2025-32975 across all affected product lines. Organizations must immediately update KACE Systems Management Appliance to version 13.2.146 or later, and KACE Systems Deployment Appliance to version 8.2.158 or later. The patches include comprehensive input validation improvements and additional authentication checks for the web management interface.

For organizations that cannot immediately apply patches, Quest recommends implementing network-level protections to limit access to KACE web interfaces. This includes restricting management access to trusted IP ranges, implementing VPN requirements for remote access, and deploying web application firewalls with rules that block malicious request patterns. Quest has published specific firewall rules and intrusion detection signatures to help organizations detect and prevent exploitation attempts.

System administrators should immediately review KACE appliance logs for indicators of compromise, including unexpected file uploads, unusual command execution patterns, and unauthorized configuration changes. Quest's security advisory includes specific log entries and file system artifacts that indicate successful exploitation. Organizations should also verify the integrity of managed device configurations and check for unauthorized software deployments that might indicate lateral movement from compromised KACE systems.

The patching process requires a brief service interruption, but Quest has designed the updates to minimize downtime for critical device management operations. Organizations should schedule maintenance windows during low-usage periods and ensure they have backup access methods for managed endpoints during the update process. Quest's technical support team is providing expedited assistance for customers experiencing difficulties with patch deployment or suspected compromise incidents.

Frequently Asked Questions

How do I check if my Quest KACE system is vulnerable to CVE-2025-32975?+
Check your KACE Systems Management Appliance version - if you're running 13.0 through 13.2.145, you're vulnerable. KACE Systems Deployment Appliance versions 8.0 through 8.2.157 are also affected. Update immediately to versions 13.2.146 or 8.2.158 respectively.
What can attackers do with CVE-2025-32975 exploitation?+
Attackers can execute arbitrary commands with elevated privileges on KACE appliances without authentication. This allows complete system compromise, access to managed endpoints, credential theft, and lateral movement through connected networks.
Which organizations are being targeted in CVE-2025-32975 attacks?+
Educational institutions are the primary targets, with at least twelve school districts and universities confirmed as victims. The vulnerability affects approximately 3,000 organizations worldwide across education, corporate, government, and healthcare sectors.

Discussion

Share your thoughts and insights

Sign in to join the discussion