Quest KACE SMA functions as a privileged control plane for enterprise endpoints — managing patches, software, and configurations across an organization's entire device fleet. An attacker who successfully exploits this vulnerability can impersonate any user on that platform without credentials, potentially deploying malicious software, disabling security controls, or establishing persistent access across every managed endpoint. If systems managed through KACE SMA include devices that process regulated data (patient records, payment systems, financial data), the breach exposure extends to those regulated environments, creating direct legal and compliance liability.
You Are Affected If
You run Quest KACE Systems Management Appliance (SMA) in your environment — any version listed as affected in Quest advisory KB4379499
The KACE SMA management interface is accessible from the internet or from untrusted network segments without strict firewall controls
You have not yet applied the patch documented in Quest advisory KB4379499
Multi-factor authentication is not enforced for KACE SMA administrative access, reducing compensating control effectiveness
KACE SMA manages endpoints that store or process regulated or sensitive data (financial systems, medical devices, HR systems)
Board Talking Points
A confirmed, actively exploited flaw in our endpoint management platform allows attackers to take control of that system without a password, giving them reach across every device it manages.
IT and security teams must apply the vendor patch immediately and verify no unauthorized access occurred before May 4, 2026, the federal remediation deadline.
If this vulnerability is not patched, an attacker can use our own management infrastructure to deploy malware, steal data, or disable security controls at scale across the organization.
HIPAA — KACE SMA managing endpoints that store or transmit protected health information creates breach notification obligations if unauthorized access is confirmed
PCI-DSS — KACE SMA managing systems in the cardholder data environment may constitute a security control failure requiring incident assessment under PCI-DSS v4.0 requirements 6.3 and 12.10
FISMA/FEDRAMP — Federal agencies or contractors running KACE SMA must treat active KEV-listed vulnerabilities as mandatory remediation items under BOD 22-01 by the May 4, 2026 due date