CVE-2025-8875

N-able · N-able N-central

A high-severity vulnerability has been identified in N-able N-central, a widely used remote monitoring and management platform.

Executive summary

A high-severity vulnerability has been identified in N-able N-central, a widely used remote monitoring and management platform. This flaw, tracked as CVE-2025-8875, allows an attacker with local access to a system to execute arbitrary code, potentially leading to a complete system compromise. Due to confirmed active exploitation in the wild, immediate patching is critical to prevent unauthorized access and control of managed infrastructure.

Vulnerability

This vulnerability is an instance of "Deserialization of Untrusted Data." The N-able N-central application improperly validates serialized data inputs. An attacker who has already gained local access to a machine running the software can provide a specially crafted malicious object. When the application deserializes this object, it can trigger the execution of embedded code with the privileges of the N-central application, leading to local code execution.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could result in a complete compromise of the N-able N-central server, leading to a loss of confidentiality, integrity, and availability. As N-central is a management platform for numerous endpoints, its compromise could serve as a launchpad for broader attacks across the managed network, potentially leading to widespread data breaches, ransomware deployment, and significant operational disruption.

Remediation

Immediate Action: Apply the security updates provided by N-able to all affected N-central instances immediately. After patching, it is crucial to monitor for any signs of post-compromise activity by reviewing system and application access logs for unusual or unauthorized actions.

Proactive Monitoring: Security teams should monitor for indicators of compromise, including unusual processes spawned by the N-central service, unexpected outbound network connections from the server, and deserialization error messages in application logs. Monitor file integrity on the system to detect unauthorized changes.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls such as restricting interactive logon access to the N-central server to only authorized administrators. Utilize application control or whitelisting solutions to prevent the execution of unauthorized code. Enhance Endpoint Detection and Response (EDR) monitoring on the server with rules specific to this vulnerability's exploitation patterns.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high-severity rating, the critical role of N-able N-central in managing IT infrastructure, and its confirmed status as an actively exploited vulnerability (CISA KEV), this issue represents a significant and immediate risk. We strongly recommend that all organizations treat this as an emergency and apply the vendor-supplied patches immediately, without delay. The CISA deadline of August 19, 2025, should be adopted as the absolute latest remediation date to prevent compromise.