This week’s Focus Friday examines four critical vulnerabilities with broad implications for supply chain security and Third-Party Risk Management (TPRM). Microsoft Exchange Server and Microsoft SQL Server both received significant security updates addressing multiple privilege escalation and injection flaws. N-able N-Central RMM was patched for two actively exploited command execution vulnerabilities, underscoring the urgency of securing remote management platforms. Finally, Squid Proxy was found to contain a critical heap buffer overflow vulnerability that could lead to remote code execution and sensitive data leakage. Together, these issues highlight the importance of timely remediation, vendor coordination, and targeted risk management in protecting interconnected digital ecosystems.

Filtered view of companies with Exchange Server – Aug2025 FocusTag™ on the Black Kite platform.
In August 2025, Microsoft disclosed five security vulnerabilities in Exchange Server, the most severe being CVE-2025-53786 (CVSS: 8.0, EPSS: 0.08%) — a high-severity post-authentication privilege escalation flaw in on-premises Exchange servers configured for hybrid deployments. In such setups, Exchange Server and Exchange Online share the same service principal for authentication. An attacker with administrator privileges on the on-prem server can extract the Exchange OAuth certificate and request service tokens from Microsoft’s Access Control Service (ACS), valid for up to 24 hours. These tokens enable impersonation of hybrid users, bypass Conditional Access policies, and allow access to Exchange Online, SharePoint, and other Microsoft 365 resources with minimal logging.
Microsoft first addressed the issue in April 2025 via a non-security hotfix and configuration guidance, later assigning it CVE-2025-53786 after confirming its privilege escalation risk. On August 6, 2025, CISA issued Emergency Directive 25-02 mandating patching by August 11, 2025, and Spain’s INCIBE-CERT released an advisory. Exploitation requires multiple conditions: the attacker must already hold administrative rights on the on-premises Exchange server, possess the OAuth certificate/private key, and the environment must still use (or retain remnants of) the shared service principal hybrid model without the April 2025 patch or an updated configuration. Even if hybrid/OAuth integration is no longer active, the risk persists until the shared service principal’s key keyCredentials are cleared. Without the combination of hybrid deployment, a shared service principal, admin access, certificate access, and the lack of patching or reconfiguration, exploitation is not feasible. This vulnerability is listed in the EU Vulnerability Database as EUVD-2025-23857.
The other August 2025 Exchange Server vulnerabilities are: CVE-2025-25005 (CVSS: 6.5, EPSS: 0.12%) – improper input validation enabling tampering by an authorized attacker; CVE-2025-25006 (CVSS: 5.3, EPSS: 0.05%) – improper handling of a special element allowing spoofing; CVE-2025-25007(CVSS: 5.3, EPSS: 0.07%) – improper syntactic input validation enabling spoofing; and CVE-2025-33051 (CVSS: 7.5, EPSS: 0.07%) – information disclosure to unauthorized actors. All remain exploitable until patched. No public proof-of-concept (PoC) code is available, and as of August 21, 2025, none have been observed in active exploitation by threat actors. CVE-2025-53786 and others are not in CISA’s Known Exploited Vulnerabilities (KEV) catalog, but Microsoft has assessed them as “more likely” to be exploited.
These vulnerabilities, especially CVE-2025-53786, present a significant supply chain risk because they bridge on-premises and cloud environments. A compromised vendor Exchange Server in a hybrid configuration could allow attackers to access email accounts, manipulate sensitive communications, or leverage compromised identities to infiltrate Microsoft 365 resources. The potential for bypassing Conditional Access and leaving minimal detection logs increases the difficulty of detecting malicious activity, which means a vendor compromise could silently expose your organization’s sensitive data or be used to launch further attacks.
To assess vendor exposure and remediation efforts, TPRM teams should consider the following targeted questions:
Vendors with hybrid Exchange deployments should immediately:
Black Kite’s Exchange Server – Aug 2025 FocusTag enables organizations to quickly identify vendors at risk from CVE-2025-53786 and related vulnerabilities. Once published, the FocusTag includes:

Black Kite’s Exchange Server – Aug2025 FocusTagTM details critical insights on the event for TPRM professionals.
In the August 2025 Patch Tuesday release, Microsoft addressed five high-severity privilege escalation vulnerabilities in Microsoft SQL Server, all rated similarly. These include CVE-2025-49758, CVE-2025-24999, CVE-2025-53727, CVE-2025-49759, and CVE-2025-47954, each with a CVSS score of 8.8. Their EPSS scores range from 0.02% to 0.07%, underscoring varying levels of potential exploitability. Most of these issues stem from SQL injection weaknesses or improper privilege management, enabling an authenticated low-privilege user to elevate to sysadmin rights over a network. No proof-of-concept exploits are publicly available, and none of these vulnerabilities have been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog as of August 2025. All five are listed in the European Union’s Vulnerability Database as EUVD-2025-24377, EUVD-2025-24368, EUVD-2025-24376, EUVD-2025-24359, and EUVD-2025-24301.
Why should TPRM professionals pay attention?
From a third-party risk management perspective, these vulnerabilities represent a significant vector for compromise: they allow unauthorized escalation to sysadmin privileges within a vendor’s SQL infrastructure. Such access could lead to unauthorized data exposure, malicious schema or data changes, or pivoting deeper into an organization’s systems. Since these vulnerabilities require only authenticated access to be exploited, they present an elevated supply chain risk—especially for vendors hosting customer data, business-critical systems, or maintaining direct access to downstream systems.
To gauge vendor exposure and remediation readiness, TPRM teams should consider the following:
Here are key remediation steps for affected vendors:
Black Kite’s MSSQL – Aug 2025 FocusTag equips TPRM teams with targeted threat intel to streamline vendor risk assessments:

Black Kite’s MSSQL – Aug2025 FocusTagTM details critical insights on the event for TPRM professionals.
N-able N-central RMM (Remote Monitoring and Management) is a cloud-based or on-premise remote monitoring and management platform developed by N-able. Its primary purpose is to enable MSPs (Managed Service Providers) and corporate IT teams to centrally monitor and manage all devices, servers, and applications within customer or company networks.
In August 2025, N-able released patches for two critical vulnerabilities affecting its N-Central Remote Monitoring and Management (RMM) platform: CVE-2025-8875 and CVE-2025-8876. Both flaws require authentication to exploit but are already being actively abused in the wild. CVE-2025-8875 is an insecure deserialization issue that allows an authenticated attacker to execute arbitrary commands on the affected system. CVE-2025-8876 is a command injection flaw caused by improper input sanitization, enabling attackers with valid credentials to inject and run malicious commands.
CISA added both vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on August 13, 2025, following confirmation of active exploitation in real-world attacks. Although no public proof-of-concept exploits exist, the active exploitation status significantly increases the urgency for patching. These flaws impact N-Central versions prior to 2025.3.1 and 2024.6 HF2.
Because these vulnerabilities are actively exploited and target a widely used RMM platform, they carry substantial supply chain implications. An exploited N-Central instance could give attackers a foothold into a vendor’s managed infrastructure, enabling further compromise of customer networks, exfiltration of sensitive data, or deployment of ransomware across connected systems. Given the centralized control RMM tools have over endpoints, a successful attack could quickly propagate, affecting multiple downstream organizations.
To evaluate vendor risk and remediation status, TPRM teams should consider asking:
Vendors should take the following immediate steps:
Black Kite’s N-able N-Central RMM FocusTag, published August 14, 2025, enables TPRM teams to quickly identify vendors operating potentially vulnerable N-Central instances. The tag includes asset intelligence such as IP addresses and subdomains linked to affected environments, allowing for targeted outreach. By leveraging this intelligence, TPRM professionals can prioritize engagement with at-risk vendors, verify their patch status, and reduce unnecessary questionnaires to unaffected parties.

Black Kite’s N-able N-Central RMM FocusTagTM details critical insights on the event for TPRM professionals.
CVE-2025-54574 is a critical heap buffer overflow vulnerability in Squid, a widely used web caching proxy, carrying a CVSS score of 9.3 and an EPSS score of 1.22%. The flaw is caused by incorrect buffer management when processing Uniform Resource Name (URN) requests. When a vulnerable Squid instance receives a specially crafted URN Trivial-HTTP response from a remote server, it can trigger a heap buffer overflow, potentially leading to remote code execution (RCE), process crashes, or the leakage of up to 4KB of sensitive memory contents. This exposed data may include credentials or other confidential information.
The vulnerability can be exploited without privileges or user interaction, significantly increasing the potential risk in enterprise and service provider networks where Squid acts as a critical infrastructure component. All Squid 4.x versions up to 4.17, 5.x up to 5.9, and 6.x up to 6.3 are affected. Versions older than 4.14 have not been tested but should be considered vulnerable. A patched release, Squid 6.4, and backported fixes for other supported branches have been issued. No public proof-of-concept (PoC) exploit has been released, and this vulnerability is not listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog as of mid-August 2025. It is registered in the European Union’s Vulnerability Database under EUVD-2025-23392.
From a third-party risk perspective, this vulnerability poses a significant threat to organizations relying on vendors that deploy Squid proxies within their infrastructure. Because the flaw can be exploited remotely and without user action, a compromised Squid instance could be leveraged to execute malicious code within a vendor’s network or exfiltrate sensitive information. In managed service environments or ISPs, exploitation could result in widespread compromise or data leakage affecting multiple downstream customers. The lack of required authentication or interaction means any vendor operating an unpatched Squid version could serve as an immediate and exploitable entry point.
When assessing a vendor’s exposure and mitigation status, TPRM teams should ask:
Vendors should take the following actions immediately:
Black Kite’s Squid Proxy – Aug 2025 FocusTag, published August 5, 2025, enables security and risk teams to pinpoint which vendors have potentially vulnerable Squid installations. The tag provides detailed asset intelligence, including IP addresses and subdomains linked to identified Squid servers, enabling targeted vendor outreach. By using this data, TPRM professionals can prioritize high-risk vendors for immediate verification and remediation, while avoiding unnecessary engagement with unaffected parties.

Black Kite’s Squid Proxy – Aug2025 FocusTagTM details critical insights on the event for TPRM professionals.
Black Kite’s FocusTags™ provide a decisive advantage for organizations facing critical vulnerabilities like those affecting Exchange Server, MSSQL, N-able N-Central RMM, and Squid Proxy. These tags enable:
By converting complex vulnerability intelligence into actionable insights, Black Kite’s FocusTags™ empower TPRM teams to act swiftly, allocate resources effectively, and reduce exposure to the most pressing threats in today’s rapidly evolving cyber risk environment.
Every week, we delve into the realms of critical vulnerabilities and their implications from a Third-Party Risk Management (TPRM) perspective. This series is dedicated to shedding light on pressing cybersecurity threats, offering in-depth analyses, and providing actionable insights.
See Black Kite’s full CVE Database and the critical TPRM vulnerabilities that have an applied FocusTagTM at https://blackkite.com/cve-database/.
References
https://nvd.nist.gov/vuln/detail/CVE-2025-53786
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786
https://nvd.nist.gov/vuln/detail/CVE-2025-47954
https://nvd.nist.gov/vuln/detail/CVE-2025-24999
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47954
https://nvd.nist.gov/vuln/detail/CVE-2025-49759
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727
https://nvd.nist.gov/vuln/detail/CVE-2025-53727
https://nvd.nist.gov/vuln/detail/CVE-2025-49758
https://nvd.nist.gov/vuln/detail/CVE-2025-8876
https://nvd.nist.gov/vuln/detail/CVE-2025-8875
https://thehackernews.com/2025/08/cisa-adds-two-n-able-n-central-flaws-to.html
https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3