Session ID Generation Vulnerability in N-central by N-able
CVE-2025-9316

6.9MEDIUM

Key Information:

Vendor

N-able

Status
Vendor
CVE Published:
12 November 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 78%

What is CVE-2025-9316?

CVE-2025-9316 is a security vulnerability found in N-central, a network and systems monitoring software developed by N-able. The primary function of N-central is to provide IT service providers with tools to manage and monitor their IT environments, ensuring operational efficiency and security. This vulnerability pertains to the improper generation of session IDs for unauthenticated users, which can lead to unauthorized access. If exploited, malicious actors could leverage this issue to gain control of user sessions without appropriate authentication, potentially allowing them to manipulate or access sensitive data and system functionalities. The flaw affects versions of N-central prior to 2025.4, making organizations that haven't updated particularly susceptible to attacks that exploit this vulnerability.

Potential impact of CVE-2025-9316

  1. Unauthorized Access: The most immediate consequence of CVE-2025-9316 is the potential for unauthorized users to gain access to the system. This could allow attackers to execute functions within N-central, manipulating system configurations or accessing sensitive customer information.

  2. Data Compromise: Exploitation of this vulnerability could lead to significant data breaches, where sensitive information managed by N-central, including client data and internal system configurations, may be exposed or altered by unauthorized actors.

  3. Operational Disruption: With unauthorized access to a critical IT management system, attackers could disrupt service delivery, hinder monitoring capabilities, and potentially engage in further malicious activities, leading to downtime and financial losses for affected organizations.

Affected Version(s)

N-central Linux 0 < 2025.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

78% chance of being exploited in the next 30 days.

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.