Saturday, March 14, 2026

Severe Vulnerabilities In N-able N-central Enable Unauthorized Legacy API Access and Sensitive File Disclosure

N-able N-central, a popular remote monitoring and management (RMM) platform used by enterprises and managed service providers (MSPs), faces severe vulnerabilities that allow unauthenticated attackers to bypass authentication, write files, and disclose sensitive information via XML External Entity (XXE) injection.

These flaws, uncovered by Horizon3.ai researchers during analysis of earlier CISA Known Exploited Vulnerabilities (KEV) entries CVE-2025-8875 and CVE-2025-8876, chain together to compromise the entire system, exposing database credentials, SSH keys, and API tokens.

Approximately 3,000 instances remain exposed on the internet per Shodan scans, heightening the risk to unpatched deployments.​

The vulnerabilities stem from legacy SOAP APIs, such as/dms/services/ServerMMS and /dms/services/ServerUI.

CVE-2025-9316 enables unauthenticated session ID generation via the sessionHello method, exploiting default built-in appliances with static, known values to produce valid appliance-scoped session IDs.

Researchers combined this with an un-CVE’d limited file write in applianceLogSubmit, which stores arbitrary base64-encoded content at /opt/nable/webapps/ROOT/applianceLog/network_check_log_.log.

CVE-2025-11700 then triggers XXE in importServiceTemplateFromFile on ServerUI, where an insecure SAXParser in XMLValidator.validateXML lacks protection against external entities (CWE-611), allowing parsing of attacker-controlled XML without session validation.

N-central Critical File Exposure

Attackers can restore the database and decrypt secrets using the provided keys, granting domain credentials, N-central API keys, integrated service tokens, and private SSH keys for lateral movement. A proof-of-concept exploit chaining these is public on GitHub.

CVE ID
Vulnerability Type
Affected ProductsCVSS ScoreImpactExploit PrerequisitesPatch Version
CVE-2025-8875Authenticated Insecure DeserializationN-able N-central < 2025.3.19.4Remote Code ExecutionValid session ID2025.3.0.14
CVE-2025-8876Authenticated Command InjectionN-able N-central < 2025.3.1N/ARemote Code ExecutionValid session ID2025.3.0.14
CVE-2025-9316Authentication BypassN-able N-central < 2025.4CriticalUnauthenticated Session IDNetwork access2025.4.0.9
CVE-2025-11700XXE Information DisclosureN-able N-central < 2025.48.4File Read, Credential LeakNetwork access + chain2025.4.0.9

Attack Chain and Detection

Attackers retrieve appliance session IDs via crafted sessionHello SOAP requests, write malicious XXE payloads to log files, then import them for exfiltration, often targeting backups for full compromise.

Indicators include dmsservice.log errors such as “Failed to import service template from file,” which expose leaked content, “Exception calling ServerUI:importServiceTemplateFromFile,” and dmsservice_soap.log noting “servicetemplate xml could not be imported” with DTD references.

N-able patched in 2025.4.0.9 by turning off vulnerable APIs by default and securing parsers.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News