Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Gladinet CentreStack Flaw Exploited to Hack Organizations

Gladinet CentreStack Flaw Exploited to Hack Organizations

Posted on December 12, 2025December 12, 2025 By CWS

Huntress warns of a brand new wave of assaults concentrating on Gladinet CentreStack cases to retrieve cryptographic keys and obtain distant code execution.

As a part of the assaults, hackers have exploited a brand new vulnerability within the cell entry and safe sharing answer, the cybersecurity agency says.

The exploited bug, Huntress says, is an insecure cryptography situation that enables attackers to entry the ‘net. config’ file, which accommodates a ‘machineKey’ cryptographic key.

Huntress’s evaluation of the assaults revealed that the hackers have been abusing the truth that CentreStack depends on the identical two 100-byte strings to derive the cryptographic keys.

Based on the cybersecurity agency, an attacker that may retrieve this cryptographic info also can use it for future encryption/decryption operations, thus compromising the occasion.

“As a result of these keys by no means change, we might extract them from reminiscence as soon as and use them to decrypt any ticket generated by the server or worse, encrypt our personal,” Huntress notes.

Utilizing the 2 strings, any attacker might craft requests to acquire the machine keys from the ‘net. config’ file, and the system would belief these requests.

Subsequent, armed with the machine keys, the attacker can abuse the ASPX ViewState mechanism in deserialization assaults by forging ViewState payloads and attaining distant code execution.Commercial. Scroll to proceed studying.

The ViewState deserialization situation has been exploited this yr in assaults concentrating on two different CentreStack vulnerabilities, particularly CVE-2025-30406 and CVE-2025-11371.

Huntress additionally found that the attackers crafted their malicious requests to create a ticket that by no means expires, which basically permits them to reuse the identical URL indefinitely to retrieve the configuration file.

“As of December 10, we’ve seen 9 organizations which have been impacted by this vulnerability. These companies ranged throughout completely different sectors, from healthcare to know-how,” Huntress notes.

No CVE identifier has been printed for the flaw and Gladinet has not shared particulars on it. Nevertheless, the corporate notified its prospects in late November of a safety situation resolved with a brand new CentreStack replace (model 16.11.10417.56762).

Organizations are suggested to replace to the most recent model of CentreStack and Triofox, particularly model 16.12.10420.56791, which was launched on December 10, and to evaluation the indications of compromise (IoCs) launched by Huntress and Gladinet.

Associated: Latest GeoServer Vulnerability Exploited in Assaults

Associated: Unpatched Gogs Zero-Day Exploited for Months

Associated: Crucial King Addons Vulnerability Exploited to Hack WordPress Websites

Associated: Microsoft Silently Mitigated Exploited LNK Vulnerability

Security Week News Tags:CentreStack, Exploited, Flaw, Gladinet, Hack, Organizations

Post navigation

Previous Post: Top 20 Most Exploited Vulnerabilities of 2025
Next Post: New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Related Posts

Surge in Cyberattacks: AI, APIs, and DDoS Converge Surge in Cyberattacks: AI, APIs, and DDoS Converge Security Week News
US Charges 31 More Defendants in Massive ATM Hacking Probe US Charges 31 More Defendants in Massive ATM Hacking Probe Security Week News
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Security Week News
High-Severity Vulnerabilities Patched by Cisco, Atlassian High-Severity Vulnerabilities Patched by Cisco, Atlassian Security Week News
Flare Raises  Million for Threat Exposure Management Platform Flare Raises $30 Million for Threat Exposure Management Platform Security Week News
Salesloft GitHub Account Compromised Months Before Salesforce Attack Salesloft GitHub Account Compromised Months Before Salesforce Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark