The N-able N-central RMM platform faces significant security threats due to multiple vulnerabilities, including CVE-2025-9316 and CVE-2025-11700, which have been identified by Horizon3.ai. These vulnerabilities allow unauthenticated attackers to exploit weak authentication methods in legacy APIs, ultimately leading to remote code execution and exposure of sensitive information, including usernames and passwords. Approximately 3,000 instances of N-central are exposed on the internet, increasing the urgency for organizations to secure their systems.
The vulnerabilities enable attackers to chain exploits effectively, starting from authentication bypass to XML External Entity (XXE) injection. Following this attack chain, attackers gain access to crucial configuration files that reveal stored database credentials in cleartext. The full compromise of infrastructure is possible once attackers decrypt these secrets using cryptographic keys exposed in the backup. N-able has released an update (version 2025.4.0.9 on November 5, 2025) to address these issues, calling on organizations to upgrade immediately and monitor for exploitation indicators. The necessity of safeguarding legacy API endpoints serves as a reminder of the importance of routine updates in enterprise software.
👉 Pročitaj original: Cyber Security News