CISA Adds Two Actively Exploited N-able Flaws to KEV Catalog

CISA Flags Critical N-able N-central Vulnerabilities, Mandates Urgent Patch for Federal Agencies Amid Active Exploitation

  • CISA has added two newly exploited vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities catalog.
  • The vulnerabilities, CVE-2025-8875 and CVE-2025-8876, have been actively exploited and impact remote monitoring software used by managed service providers.
  • N-able released security patches in versions 2025.3.1 and 2024.6 HF2 to fix these issues on August 13, 2025.
  • U.S. federal agencies must apply patches by August 20, 2025, in response to active exploitation risks.
  • CISA also flagged two older Microsoft vulnerabilities, urging updates or discontinuation for unsupported products by September 9, 2025.

The Cybersecurity and Infrastructure Security Agency (CISA) announced on August 14, 2025, that it added two critical security vulnerabilities affecting the N-able N-central platform to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation. The vulnerabilities impact N-able N-central, a remote monitoring and management platform widely used by managed service providers to oversee client networks and computers.

- Advertisement -

The two flaws—CVE-2025-8875, which enables command execution through insecure deserialization, and CVE-2025-8876, which is a command injection risk caused by insufficient sanitization of user inputs—were addressed in versions 2025.3.1 and 2024.6 HF2 released on August 13. N-able urges all customers, especially those with administrative accounts, to enable multi-factor authentication and upgrade to the latest software release.

N-able stated: “These vulnerabilities require authentication to exploit. However, there is a potential risk to the security of your N-central environment, if unpatched. You must upgrade your on-premises N-central to 2025.3.1.” The scale and method of the active exploitation are not yet known. CISA is advising all Federal Civilian Executive Branch (FCEB) agencies to apply the required patches by August 20, 2025, to mitigate potential threats.

In addition, on August 13, CISA included two older Microsoft vulnerabilities in its KEV catalog. These include CVE-2013-3893, a memory corruption issue in Internet Explorer allowing remote code execution, and CVE-2007-0671, a remote code execution vulnerability in Microsoft Office Excel. Updates must be applied or unsupported products like Internet Explorer discontinued by September 9, 2025.

At this time, the specific exploitation techniques for the N-central vulnerabilities have not been publicly disclosed. The situation remains under review as agencies and organizations work to implement the designated protections.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

DOJ seeks retrial for Tornado Cash dev on key charges

U.S. Attorney Jay Clayton has requested a retrial for Tornado Cash developer Roman Storm...

Ledger Integrates with Babylon Labs for Bitcoin Vaults

Bitcoin self-custody startup Babylon Labs has partnered with hardware wallet giant Ledger to secure...

Hackers Target AI Agent Security in New Attacks

AI Agents that automate tasks like sending emails or moving data are creating a...

Winklevoss Twins Shift $130M Bitcoin to Gemini Wallets

Gemini founders Tyler and Cameron Winklevoss transferred approximately $130 million in Bitcoin to the...

Bitcoin ETF inflows return while altcoin funds see outflows

US spot Bitcoin ETFs snapped a two-day outflow streak with a net inflow of...

Must Read

Top 9 VPNs That Accept Bitcoin And Crypto

CyberGhost | FastVPN | TorGuard | Private Internet Access | ExpressVPN | NordVPN | Private VPN | SurfShark | AirVPN | Why Buy VPN...