ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

CISA Warns of Active Exploits in N-able N-central, Urges Upgrade to 2025.3.1

Threat Score:
51
The Cyber Express
21 hours ago
Part of cluster #1926

Overview

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two high-risk vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, warning organizations of active exploitation in the wild. Identified as CVE-2025-8875, a deserialization vulnerability, and CVE-2025-8876, a command injection vulnerability, both issues pose cybersecurity risks to system integrity and are prompting immediate security action across enterprises. Decoding N-able N-central ...

Continue Reading on Original Site

Related Articles

5 articles
1

CISA Warns N-able Bugs Under Attack, Patch Now

Dark Reading • 9 hours ago

Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.

Score
84
Read more
2
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 13 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
3
Risky Bulletin: HTTP2 flaw enables massive DDoS attacks

Risky Bulletin: HTTP2 flaw enables massive DDoS attacks

Risky • 3 hours ago

Brought to you byYubico Yubikey Strong Two Factor Authentication Show notes Risky Bulletin: MadeYouReset vulnerability enables unlimited HTTP/2 DDoS attacks

Score
81
Read more
4

US Sanctions Crypto Exchange Tied to Russian Ransomware

Data Breach Today UK • 5 hours ago

US Treasury Says Crypto Exchange Helped Launder $100 Million for Ransomware Gangs The U.S. Department of Treasury sanctioned Thursday a Russian founder and co-owners of the Garantex cryptocurrency exchange in a bid to tighten methods criminal hackers use to launder extortion money and Kremlin sanctions busting. Regulators also sanctioned Garantex successor Grinex.

Score
79
Read more
5

Norway confirms dam intrusion by Pro-Russian hackers

Security Affairs • 11 hours ago

Norway’s security service PST says pro-Russian hackers took over a dam in April, opening outflow valves. Norway’s Police Security Service (PST) says pro-Russian hackers seized control of a dam’s systems in April, opening outflow valves. On April 7, the attackers took control of a dam in Bremanger, western Norway, opening a flood gate to release […]

Score
79
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-8875
CVE-2025-8876
VULNERABILITIES
Authentication Bypass
Command Injection
Insecure Deserialization
Remote Code Execution
AGENCIES
CISA
Cybersecurity and Infrastructure Security Agency
STANDARDS
CMMC
RANSOMWARE
Final
MALWARE
Leverage
ATTACK TYPES
Command Injection
Deserialization
Insecure Deserialization
Remote Code Execution
MITRE ATT&CK
T1021.001
T1041
T1056.001
T1059.001
T1059.003
COMPANIES
N-able
PLATFORMS
Linux
N-able N-Central
Windows
INDUSTRIES
IT Management
IT Services
Information Technology
Managed Service Providers
Managed Services
COUNTRIES
United States
ARTICLE INFORMATION
Article #11420
Published 21 hours ago
The Cyber Express

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration