Original Article Text

Click to Toggle View

Hackers exploiting zero-day in Gladinet file sharing software. Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local attacker to access system files without authentication. At least three companies have been targeted so far. Although a patch is not yet available, customers can apply mitigations. CentreStack and Triofox are Gladinet's business solutions for file sharing and remote access that allow using a company's own storage as a cloud. According to the vendor, CentreStack "is used by thousands of businesses from over 49 countries." No fix, all versions affected The zero-day vulnerability CVE-2025-11371 is a Local File Inclusion (LFI) flaw affecting the default installation and configuration of both products, impacting all versions  including the latest release, 16.7.10368.56560. Researchers at managed cybersecurity platform Huntress detected the security issue on September 27 when a threat actor successfully exploited it to obtain a machine key and execute code remotely. A closer analysis revealed that the issue was an LFI leveraged to read the Web.config and extract the machine key. This allowed the attacker to use an older deserialization vulnerability (CVE-2025-30406) and achieve remote code execution (RCE) through ViewState. The CVE-2025-30406 deserialization bug in CentreStack and Triofox was also exploited in the wild in March, and was due to a hardcoded machine key. An attacker knowing the key could perform RCE on an affected system. “After subsequent analysis, Huntress discovered exploitation of an unauthenticated local file inclusion vulnerability (CVE-2025-11371) that allowed a threat actor to retrieve the machine key from the application Web.config file to perform remote code execution via the aforementioned ViewState deserialization vulnerability” - Huntress Huntress contacted Gladinet to let them know the finding.  The vendor confirmed that it was aware of the vulnerability and said that it was in the process of notifying customers of a workaround until a patch is available. The researchers shared the mitigation with the targeted customer and published the following recommendations to protect against CVE-2025-11371: This line enables the vulnerable functionality that attackers exploit via Local File Inclusion, so removing it prevents exploitation of CVE-2025-11371. The researchers warn that the mitigations "will impact some functionality of the platform," but make sure that the vulnerability cannot be exploited. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy

Daily Brief Summary

VULNERABILITIES // Zero-Day Exploit in Gladinet Software Threatens Global Businesses

A zero-day vulnerability (CVE-2025-11371) in Gladinet's CentreStack and Triofox software allows unauthorized local access to system files, impacting all versions, including the latest release.

At least three companies have been targeted by threat actors exploiting this flaw to gain unauthorized access and execute code remotely.

The vulnerability is a Local File Inclusion (LFI) flaw, enabling attackers to extract machine keys and leverage an older deserialization vulnerability (CVE-2025-30406) for remote code execution.

Huntress researchers discovered the issue and informed Gladinet, which is working on notifying customers and providing a workaround until a patch is available.

Mitigations have been shared with affected customers, but they may reduce some platform functionalities to prevent exploitation.

CentreStack is widely used by thousands of businesses across 49 countries, indicating a significant potential impact if the vulnerability is not addressed promptly.

Organizations using these products should implement recommended mitigations immediately to protect against potential exploitation.