Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Posted on October 10, 2025October 10, 2025 By CWS

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day

Cybersecurity firm Huntress stated it has noticed lively in-the-wild exploitation of an unpatched safety flaw impacting Gladinet CentreStack and TrioFox merchandise.
The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS rating: 6.1), is an unauthenticated native file inclusion bug that permits unintended disclosure of system recordsdata. It impacts all variations of the software program previous to and together with 16.7.10368.56560.
Huntress stated it first detected the exercise on September 27, 2025, uncovering that three of its clients have been impacted to date.
It is price noting that each functions had been beforehand affected by CVE-2025-30406 (CVSS rating: 9.0), a case of hard-coded machine key that would enable a risk actor to carry out distant code execution by way of a ViewState deserialization vulnerability. The vulnerability has since come beneath lively exploitation.

CVE-2025-11371, per Huntress, “allowed a risk actor to retrieve the machine key from the appliance Net.config file to carry out distant code execution by way of the aforementioned ViewState deserialization vulnerability. Further particulars of the flaw are being withheld in mild of lively exploration and within the absence of a patch.
In a single occasion investigated by the corporate, the affected model was newer than 16.4.10315.56368 and never susceptible to CVE-2025-30406, suggesting that attackers may exploit earlier variations and use the hard-coded machine key to execute code remotely by way of the ViewState deserialization flaw.

Within the interim, customers are advisable to disable the “temp” handler inside the Net.config file for UploadDownloadProxy situated at “C:Program Information (x86)Gladinet Cloud EnterpriseUploadDownloadProxyWeb.config.”
“It will influence some performance of the platform; nevertheless, it would be sure that this vulnerability can’t be exploited till it’s patched,” Huntress researchers Bryan Masters, James Maclachlan, Jai Minton, and John Hammond stated.

The Hacker News Tags:Active, Detected, Exploitation, Gladinet, TrioFox, Vulnerability

Post navigation

Previous Post: New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
Next Post: ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Related Posts

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
Key Findings from the Blue Report 2025 The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News