INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h
Vulnerabilities

CVE-2025-32975

Critical 🇺🇸 CISA KEV
Published: Apr 20, 2026  ·  Source: CISA_KEV
CVSS v3
9.8
🔗 NVD Official
📄 Description (English)

Quest KACE Systems Management Appliance (SMA) — CVE-2025-32975
Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Due Date: 2026-05-04

🤖 AI Executive Summary

Quest KACE SMA contains a critical authentication bypass vulnerability (CVSS 9.8) allowing attackers to impersonate legitimate users without credentials. This poses an immediate threat to Saudi organizations using KACE for IT asset management and endpoint control. No patch is currently available, requiring immediate implementation of compensating controls and network isolation. The vulnerability affects authentication mechanisms across all KACE SMA deployments.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 02:49
🇸🇦 Saudi Arabia Impact Assessment
Critical impact on Saudi government agencies (NCA, NCSC), banking sector (SAMA-regulated institutions, major banks), healthcare organizations (MOH facilities), energy sector (ARAMCO, SEC), and telecommunications (STC, Mobily). KACE SMA is widely deployed for IT infrastructure management across these sectors. Successful exploitation enables lateral movement, data exfiltration, malware deployment, and complete infrastructure compromise. Government and critical infrastructure sectors face highest risk due to dependency on centralized IT management systems.
🏢 Affected Saudi Sectors
Government (NCA, NCSC, Ministry of Interior) Banking and Financial Services (SAMA-regulated) Healthcare (Ministry of Health) Energy and Utilities (ARAMCO, SEC) Telecommunications (STC, Mobily) Education (Universities, Technical Institutes) Critical Infrastructure Large Enterprise IT Operations
⚖️ Saudi Risk Score (AI)
9.6
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Isolate all KACE SMA instances from production networks using network segmentation and firewall rules
2. Restrict administrative access to KACE SMA to specific trusted IP ranges only
3. Implement multi-factor authentication (MFA) at network perimeter for KACE access
4. Enable comprehensive logging and monitoring of all KACE SMA authentication attempts and administrative actions
5. Review and revoke all active sessions and API tokens

COMPENSATING CONTROLS:
6. Deploy Web Application Firewall (WAF) rules to detect and block authentication bypass attempts
7. Implement network-based intrusion detection/prevention (IDS/IPS) signatures for KACE exploitation patterns
8. Conduct immediate audit of KACE user accounts and remove unnecessary administrative privileges
9. Monitor for suspicious authentication patterns: failed logins, unusual IP sources, off-hours access
10. Implement VPN requirement for all KACE SMA access with certificate-based authentication

DETECTION RULES:
11. Alert on authentication requests with missing or malformed credentials
12. Monitor for rapid sequential login attempts from single source
13. Track administrative action logs for actions by newly created or suspicious accounts
14. Flag access from non-whitelisted IP addresses
15. Monitor for unusual KACE API calls or direct database access attempts

PATCHING STRATEGY:
16. Subscribe to Quest security advisories for patch availability
17. Prepare isolated test environment for patch deployment upon release
18. Develop rollback procedures before applying any patches
19. Consider alternative IT management solutions if patch timeline extends beyond 90 days
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. عزل جميع نسخ KACE SMA عن شبكات الإنتاج باستخدام تقسيم الشبكة وقواعد جدار الحماية
2. تقييد الوصول الإداري إلى KACE SMA لنطاقات عناوين IP موثوقة محددة فقط
3. تطبيق المصادقة متعددة العوامل (MFA) على محيط الشبكة لوصول KACE
4. تفعيل السجلات الشاملة ومراقبة جميع محاولات المصادقة والإجراءات الإدارية في KACE SMA
5. مراجعة وإلغاء جميع الجلسات النشطة وعناصر API

الضوابط البديلة:
6. نشر قواعد جدار تطبيقات الويب (WAF) للكشف عن محاولات تجاوز المصادقة وحجبها
7. تطبيق توقيعات الكشف/الوقاية عن التطفل (IDS/IPS) لأنماط استغلال KACE
8. إجراء تدقيق فوري لحسابات مستخدمي KACE وإزالة الامتيازات الإدارية غير الضرورية
9. مراقبة أنماط المصادقة المريبة: فشل تسجيل الدخول، مصادر IP غير عادية، الوصول خارج ساعات العمل
10. تطبيق متطلبات VPN لجميع وصول KACE SMA مع المصادقة القائمة على الشهادات

قواعد الكشف:
11. تنبيهات على طلبات المصادقة ذات بيانات الاعتماد المفقودة أو المشوهة
12. مراقبة محاولات تسجيل الدخول المتسلسلة السريعة من مصدر واحد
13. تتبع سجلات الإجراءات الإدارية للإجراءات من حسابات مريبة أو حديثة الإنشاء
14. وضع علامة على الوصول من عناوين IP غير مدرجة في القائمة البيضاء
15. مراقبة استدعاءات KACE API غير العادية أو محاولات الوصول المباشر إلى قاعدة البيانات

استراتيجية التصحيح:
16. الاشتراك في تنبيهات أمان Quest لتوفر التصحيحات
17. تحضير بيئة اختبار معزولة لنشر التصحيح عند توفره
18. تطوير إجراءات التراجع قبل تطبيق أي تصحيحات
19. النظر في حلول إدارة تكنولوجيا المعلومات البديلة إذا امتد جدول التصحيح لأكثر من 90 يوماً
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.9.2.1 - User registration and access rights management ECC 2024 A.9.4.3 - Password management systems ECC 2024 A.8.2.1 - Information security policies and procedures ECC 2024 A.12.4.1 - Event logging and monitoring ECC 2024 A.13.1.1 - Network security perimeter
🔵 SAMA CSF
SAMA CSF ID.AM-1 - Asset Management SAMA CSF PR.AC-1 - Access Control Policy SAMA CSF PR.AC-2 - Physical and Logical Access Control SAMA CSF DE.AE-1 - Anomalies and Events Detection SAMA CSF DE.CM-1 - System Monitoring
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access Control ISO 27001:2022 A.8.2 - Information Security Policies ISO 27001:2022 A.8.3 - Organization of Information Security ISO 27001:2022 A.9.2 - User Access Management ISO 27001:2022 A.12.4 - Logging
🟣 PCI DSS v4.0
PCI DSS 2.1 - Default passwords changed PCI DSS 6.2 - Security patches installed PCI DSS 7.1 - Access control implementation PCI DSS 8.1 - User identification and authentication PCI DSS 10.2 - User access logging
🔗 References & Sources 0
No references.
📊 CVSS Score
9.8
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.8
EPSS0.54%
Exploit No
Patch ✗ No
CISA KEV🇺🇸 Yes
Published 2026-04-20
Source Feed cisa_kev
🇸🇦 Saudi Risk Score
9.6
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev cisa exploit-known
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.