PT-2025-14795 · Gladinet · Gladinet Centrestack
Published
2025-04-03
·
Updated
2025-11-28
·
CVE-2025-30406
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Gladinet CentreStack versions prior to 16.4.10315.56368
Triofox versions prior to 16.4.10317.56372
Description
Gladinet CentreStack and Triofox are affected by a deserialization vulnerability stemming from the use of a hardcoded machineKey within the CentreStack portal. This allows threat actors, possessing knowledge of the machineKey, to serialize a malicious payload for server-side deserialization, ultimately achieving remote code execution. Exploitation of this issue has been observed in the wild since March 2025, with reports indicating active exploitation and compromise of organizations. Huntress reported that seven organizations and 120 endpoints have been impacted. The vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) Catalog. Successful exploitation can lead to the enumeration of the targeted host and Active Directory environment, followed by the execution of malicious payloads in memory, including reading configuration files, enumerating domain computers and users, and downloading/executing malicious stagers. The vulnerability impacts the ASP.NET ViewState, and a proof-of-concept exploit is publicly available.
Recommendations
Gladinet CentreStack versions prior to 16.4.10315.56368: Update to version 16.4.10315.56368 or later. Alternatively, manually delete the machineKey defined in the
portalweb.config file.
Triofox versions prior to 16.4.10317.56372: Update to version 16.4.10317.56372 or later.
If patching is not immediately possible, manually rotate the machineKey in the portalweb.config file and ensure consistency across all servers in a multi-server deployment. Restart IIS after making changes.
Audit logs for access attempts, including those targeting the /portal/script endpoints.
Limit external access to CentreStack interfaces wherever feasible.
Actively monitor for suspicious deserialization activity.Fix
RCE
Using Hardcoded Credentials
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-04968
CVE-2025-30406
Affected Products
Gladinet Centrestack
References · 155
- https://centrestack.com/p/gce_latest_release.html · Security Note
- https://bdu.fstec.ru/vul/2025-04968 · Security Note
- https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-30406 · Security Note
- https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2025-triofox.pdf · Security Note
- https://twitter.com/manuelbissey/status/1910242600281420049 · Twitter Post
- https://t.me/pentestingnews/59266 · Telegram Post
- https://twitter.com/RedLegg/status/1910459905938514397 · Twitter Post
- https://twitter.com/syedaquib77/status/1910004517707657297 · Twitter Post
- https://twitter.com/gladinet/status/1908007647254638938 · Twitter Post
- https://twitter.com/syedaquib77/status/1912231752984326152 · Twitter Post
- https://t.me/csirt_italia/2384 · Telegram Post
- https://t.me/true_secator/7533 · Telegram Post
- https://twitter.com/transilienceai/status/1920270638846996489 · Twitter Post
- https://reddit.com/r/msp/comments/1jy8y1k/centrestack_folks_update_your_servers_immediatley · Reddit Post