CISA Flags Active Exploitation of Two Critical N-able N-central Flaws

CISA Flags Active Exploitation of Two Critical N-able N-central Flaws

Product and affected versions
N-able N-central — a Remote Monitoring and Management (RMM) platform used by Managed Service Providers (MSPs) for managing Windows, Apple, and Linux endpoints.

Severity and CEV ID

  • CVE-2025-8875: Insecure deserialization vulnerability (potential for command execution).

  • CVE-2025-8876: Command injection via improper sanitization of user input.

  • Severity: Both are labeled as critical, given the active exploitation and potential for remote code execution

How attacks work

  • Both vulnerabilities are exploitable only by authenticated users, raising the bar—but still dangerous, especially in multi-tenant MSP environments.

  • Active Exploitation: CISA added both to its Known Exploited Vulnerabilities (KEV) catalog on August 13, 2025, citing evidence of exploit in the wild.

  • Zero-day possibility: Reports suspect that exploitation began before public disclosure of the flaws.

  • Scope: N-able reports that a limited number of on-premises deployments have been impacted; no evidence so far in N-able’s hosted/cloud environments.

Remediations

  • Apply the hotfix/update immediately: Upgrade on-premises N-central systems to 2025.3.1 or apply 2024.6 HF2, as released on August 13, 2025.

  • Enable Multi-Factor Authentication (MFA)—especially for administrative accounts—to help mitigate risks, since exploit requires authentication.

Reference

  • The Hacker News article “CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog” by Ravie Lakshmanan, dated August 14, 2025.

  • CISA’s KEV catalog entries for CVE-2025-8875 and CVE-2025-8876.