Impact
An authentication bypass flaw in the single sign‑on handling of Quest KACE Systems Management Appliance allows an attacker to impersonate legitimate users without supplying valid credentials. The victim system accepts the forged authentication and grants the attacker full administrative privileges, effectively handing over control of the appliance and any managed assets.
Affected Systems
Quest KACE SMA 13.0.x versions prior to 13.0.385, 13.1.x prior to 13.1.81, 13.2.x prior to 13.2.183, 14.0.x prior to 14.0.341 (before Patch 5), and 14.1.x prior to 14.1.101 (before Patch 4) are vulnerable.
Risk and Exploitability
The flaw carries a CVSS score of 10, an EPSS probability of 47%, and is listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector requires network access to the appliance’s SSO endpoint, making it a high‑impact remote vulnerability that can be leveraged without user interaction.
OpenCVE Enrichment
EUVD