CISA Adds Two Vulnerabilities in N-able N-central to Its Known Exploited Vulnerabilities Catalog

Aug 14, 2025 | Vulnerability / Network Security

On Wednesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) included two security flaws affecting N-able N-central in its Known Exploited Vulnerabilities (KEV) catalog, due to evidence of active exploitation. N-able N-central is a Remote Monitoring and Management (RMM) platform tailored for Managed Service Providers (MSPs) to effectively manage and safeguard their clients’ Windows, Apple, and Linux endpoints from a centralized platform.

The identified vulnerabilities are as follows:

  • CVE-2025-8875 (CVSS score: N/A): An insecure deserialization vulnerability that may allow for command execution.
  • CVE-2025-8876 (CVSS score: N/A): A command injection vulnerability resulting from improper sanitization of user input.

Both issues have been resolved in N-central versions 2025.3.1 and 2024.6 HF2, released on August 13, 2025. N-able is also advising customers to ensure multi-factor authentication (MFA) is enabled, particularly for admin accounts.

CISA Adds Two N-able N-central Vulnerabilities to High-Risk Catalog

On August 14, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the inclusion of two significant vulnerabilities related to N-able N-central in its Known Exploited Vulnerabilities (KEV) catalog. This decision comes in response to evidence indicating that these flaws are currently being exploited in real-world scenarios.

N-able N-central is a widely used Remote Monitoring and Management (RMM) platform aimed at Managed Service Providers (MSPs). It enables users to manage and secure their clients’ endpoints, which encompass Windows, Apple, and Linux systems, from a singular interface. The integration of these critical functionalities has made the platform an attractive target for malicious actors.

The vulnerabilities listed in the KEV catalog are identified as CVE-2025-8875 and CVE-2025-8876. The first vulnerability involves an insecure deserialization flaw that may allow attackers to execute arbitrary commands. The second exposes the system to command injection risks due to inadequate input sanitization. Both issues pose a serious threat to businesses that rely on N-central for their operations.

To mitigate these vulnerabilities, N-able has released updated versions of N-central—specifically, versions 2025.3.1 and 2024.6 HF2—on August 13, 2025. In addition to implementing these updates, N-able strongly recommends that customers activate multi-factor authentication (MFA), especially for administrative accounts, to bolster their defenses against potential intrusions.

The vulnerabilities affect organizations primarily within the United States, revealing a broader issue concerning the security of RMM platforms. Given the attacks’ nature, tactics from the MITRE ATT&CK framework, such as initial access, privilege escalation, and command and control, may have been employed by threat actors. These methods highlight the importance of proactive security measures and adherence to best practices within the realm of cybersecurity.

As the landscape of cyber threats continues to evolve, the inclusion of these vulnerabilities in the KEV catalog underscores the urgency for MSPs and businesses utilizing N-able N-central to take immediate action. Ensuring that all systems are updated and monitoring for suspicious activities should be prioritized to safeguard against potential exploitation. This incident serves as a reminder of the ongoing challenges faced in the realm of cybersecurity, urging companies to remain vigilant in their security practices.

Source link