What happened
CISA added CVE-2025-32975 to the Known Exploited Vulnerabilities (KEV) catalog on 2026-04-20, signaling observed exploitation in the wild and prioritization for remediation CISA KEV. The affected product is Quest KACE Systems Management Appliance (SMA), flagged for an improper authentication weakness that can let attackers impersonate legitimate users without valid credentials CISA KEV. The National Vulnerability Database corroborates the issue and classifies it under CWE-287 (Improper Authentication), aligning with the impersonation risk described by CISA NVD CVE-2025-32975.
CISA set a short remediation window with a due date of 2026-05-04 for federal agencies, directing teams to apply vendor mitigations, follow applicable BOD 22-01 guidance for cloud services, or discontinue use if fixes are unavailable CISA KEV. The MITRE CVE record mirrors the core identifiers and serves as a canonical reference for the vulnerability entry MITRE CVE.
Why it matters
Improper authentication (CWE-287) means the system may accept a request as authenticated without correctly proving the claimant’s identity, enabling account or role impersonation NVD CVE-2025-32975. When this class of defect exists on an administrative appliance, a successful impersonation attempt can grant an adversary access that appears legitimate, complicating detection and incident response CISA KEV.
Because CISA only adds vulnerabilities to KEV when exploitation is observed, organizations should treat CVE-2025-32975 as an active risk and move to rapid remediation CISA KEV. The combination of identity bypass and an admin-focused system is exactly the sort of foothold attackers leverage for persistence and further access, and the CWE-287 classification reinforces the threat model of unauthorized user actions through impersonation NVD CVE-2025-32975.
Technical detail
CVE-2025-32975 is categorized as an Improper Authentication issue (CWE-287), which covers scenarios where a system fails to verify the user or service identity before granting authenticated functionality NVD CVE-2025-32975. CISA’s description specifies the direct impact: attackers can impersonate legitimate users without providing valid credentials, i.e., the authentication control can be bypassed to acquire an authenticated context CISA KEV. MITRE’s canonical record confirms the CVE identity and is consistent with the classification and scope conveyed by CISA/NVD MITRE CVE.
While neither CISA nor NVD details exploit mechanics, CWE-287 cases typically manifest as weak or missing checks in login/session establishment flows, resulting in requests being treated as authenticated when they are not NVD CVE-2025-32975. In practice, that translates to a path for role-aligned actions (those the impersonated user can perform) and access to data gated by those roles, with the adversary’s activity appearing to originate from a legitimate identity CISA KEV.
Defense
- Patch/mitigate now: Follow the CISA KEV directive to apply vendor mitigations or discontinue use if unavailable; federal deadlines are set for 2026-05-04 CISA KEV.
- Treat it as identity-compromise: Build detection around the CWE-287 profile—focus on authentication-to-activity correlations where actions occur without corresponding successful authentication events NVD CVE-2025-32975.
- Access control hardening: Restrict exposure of administrative interfaces, enforce strong upstream controls (reverse proxy, network ACLs), and isolate management planes to reduce the blast radius for any impersonation attempt CISA KEV.
- Session hygiene: Invalidate active sessions post-remediation and rotate credentials/secrets associated with the appliance and its service accounts to blunt lingering impersonation value NVD CVE-2025-32975.
- Telemetry focus: Hunt for anomalies aligned with impersonation—new privileged sessions, API mutations, or configuration changes attributed to users outside normal patterns, especially where logs lack a clean credentialed login preceding the activity MITRE CVE.
These controls map to the core risk—unauthorized use of authenticated capabilities—described by the KEV entry and its CWE-287 classification CISA KEV NVD CVE-2025-32975.
Lyrie Verdict
Identity bypass on an administrative appliance is prime territory for automated adversaries and rogue AI operators to blend in under legitimate identities. Lyrie prioritizes machine-speed correlation of authentication and action: we continuously reconcile session creation with downstream API/administrative operations and flag actions executed without a preceding verified login, a pattern consistent with CWE-287 exploitation NVD CVE-2025-32975. The KEV designation tells us exploitation is active, so our autonomous detectors elevate anomalies on this CVE’s surface immediately—token reuse without credential proof, abrupt privilege use by accounts with no recent successful auth, and bursts of administrative changes mapped to a single user identity—so defenders can contain before an operator can even pivot CISA KEV. Our stance: treat CVE-2025-32975 as an identity-compromise vector and let autonomous detection enforce the trust boundary in real time, reducing the attacker’s impersonation window from minutes to milliseconds MITRE CVE.
Lyrie Verdict
Identity bypass on an admin appliance is ideal for automated adversaries. Lyrie correlates authentication and action at machine speed—flagging operations executed without a preceding verified login, token reuse without credential proof, and sudden privilege use by identities lacking recent successful auth—patterns consistent with CWE-287 exploitation. With CISA marking CVE-2025-32975 as known-exploited, our detectors elevate anomalies on this surface immediately so containment happens in milliseconds, not minutes.