N Able
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any N Able product.
RSS Feeds for N Able security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in N Able products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by N Able Sorted by Most Security Vulnerabilities since 2018
Known Exploited N Able Vulnerabilities
The following N Able vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| N-able N-Central Command Injection Vulnerability |
N-able N-Central contains a command injection vulnerability via improper sanitization of user input. CVE-2025-8876 Exploit Probability: 10.3% |
August 13, 2025 |
| N-able N-Central Insecure Deserialization Vulnerability |
N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution. CVE-2025-8875 Exploit Probability: 3.0% |
August 13, 2025 |
By the Year
In 2026 there have been 0 vulnerabilities in N Able. Last year, in 2025 N Able had 7 security vulnerabilities published. Right now, N Able is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 7 | 7.00 |
| 2024 | 5 | 8.53 |
| 2023 | 1 | 7.00 |
It may take a day or so for new N Able vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent N Able Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-11367 | Nov 12, 2025 |
RCE via Deserialization in N-central Software Probe <2025.4The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via deserialization |
|
| CVE-2025-11366 | Nov 12, 2025 |
N-central <2025.4 Auth Bypass via Path Trvser (CVE-2025-11366)N-central < 2025.4 is vulnerable to authentication bypass via path traversal |
|
| CVE-2025-11700 | Nov 12, 2025 |
N-central <2025.4 XXE Info DisclosureN-central versions < 2025.4 are vulnerable to multiple XML External Entities injection leading to information disclosure |
|
| CVE-2025-9316 | Nov 12, 2025 |
Unauth SessionID Generation in N-central < 2025.4N-central < 2025.4 can generate sessionIDs for unauthenticated users This issue affects N-central: before 2025.4. |
|
| CVE-2025-10231 | Sep 10, 2025 |
N-Central Windows Agent/Probe Privilege Escalation via File PermissionAn Incorrect File Handling Permission bug exists on the N-central Windows Agent and Probe that, in the right circumstances, can allow a local low-level user to run commands with elevated permissions. |
|
| CVE-2025-8876 | Aug 14, 2025 |
N-able N-central OS Command Injection before 2025.3.1Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1. |
|
| CVE-2025-8875 | Aug 14, 2025 |
Deserialization of Untrusted Data in N-able N-central <2025.3.1 Leads to LCEDeserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1. |
|
| CVE-2024-28200 | Jul 01, 2024 |
N-central (pre-2024.2) UI Auth BypassThe N-central server is vulnerable to an authentication bypass of the user interface. This vulnerability is present in all deployments of N-central prior to 2024.2. This vulnerability was discovered through internal N-central source code review and N-able has not observed any exploitation in the wild. |
|
| CVE-2024-5322 | Jul 01, 2024 |
N-central Server Session Rebinding in Entra SSO (before 2024.3)The N-central server is vulnerable to session rebinding of already authenticated users when using Entra SSO, which can lead to authentication bypass. This vulnerability is present in all Entra-supported deployments of N-central prior to 2024.3. |
|
| CVE-2023-37244 | May 02, 2024 |
Automation Manager AgentService TOCTOU Symlink Creation (before 2.91.0.0)The affected AutomationManager.AgentService.exe application contains a TOCTOU race condition vulnerability that allows standard users to create a pseudo-symlink at C:\ProgramData\N-Able Technologies\AutomationManager\Temp, which could be leveraged by an attacker to manipulate the process into performing arbitrary file deletions. We recommend upgrading to version 2.91.0.0 |
|