CISA has added two critical N-able N-central vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation. N-able N-central, a Remote Monitoring and Management (RMM) platform, is widely used by Managed Service Providers (MSPs) to secure Windows, Apple, and Linux devices.
Vulnerabilities in N-able N-central
The following vulnerabilities were added to the KEV catalog:
- CVE-2025-8875 – An insecure deserialization vulnerability leading to command execution
- CVE-2025-8876 – A command injection vulnerability due to improper sanitization of user input
These issues have been fixed in N-central versions 2025.3.1 and 2024.6 HF2, released on August 13, 2025. N-able urges customers to update and enable multi-factor authentication (MFA), especially for admin accounts.
Risks and Required Fixes for N-able N-central
These vulnerabilities require authentication to exploit, but unpatched systems are still at risk. N-able stresses the importance of upgrading to 2025.3.1 to protect against potential exploits.
The real-world exploitation methods and the scope of the attacks remain unclear. The Hacker News has reached out to N-able for further details.
CISA’s Advisory for Federal Agencies
Given the active exploitation of these vulnerabilities, CISA advises Federal Civilian Executive Branch (FCEB) agencies to apply the necessary patches by August 20, 2025, to ensure security.
Other Vulnerabilities Added to the KEV Catalog
Along with the N-able N-central vulnerabilities, CISA has added two older flaws affecting Microsoft Internet Explorer and Microsoft Office:
- CVE-2013-3893 – A memory corruption vulnerability in Internet Explorer
- CVE-2007-0671 – A remote code execution vulnerability in Microsoft Office Excel
FCEB agencies must update these products by September 9, 2025, or discontinue their use if they have reached end-of-life (EoL) status, such as with Internet Explorer.
Conclusion
The addition of N-able N-central vulnerabilities to the CISA KEV catalog underscores the need for users to upgrade their systems promptly. Active exploitation of these flaws highlights the importance of timely patching to protect sensitive networks.
For further information on cybersecurity vulnerabilities and updates, visit CISA’s official website.