Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gladinet CentreStack Flaw Exploited to Hack Organizations

Posted on December 12, 2025December 12, 2025 By CWS

Huntress warns of a brand new wave of assaults concentrating on Gladinet CentreStack cases to retrieve cryptographic keys and obtain distant code execution.

As a part of the assaults, hackers have exploited a brand new vulnerability within the cell entry and safe sharing answer, the cybersecurity agency says.

The exploited bug, Huntress says, is an insecure cryptography situation that enables attackers to entry the ‘net. config’ file, which accommodates a ‘machineKey’ cryptographic key.

Huntress’s evaluation of the assaults revealed that the hackers have been abusing the truth that CentreStack depends on the identical two 100-byte strings to derive the cryptographic keys.

Based on the cybersecurity agency, an attacker that may retrieve this cryptographic info also can use it for future encryption/decryption operations, thus compromising the occasion.

“As a result of these keys by no means change, we might extract them from reminiscence as soon as and use them to decrypt any ticket generated by the server or worse, encrypt our personal,” Huntress notes.

Utilizing the 2 strings, any attacker might craft requests to acquire the machine keys from the ‘net. config’ file, and the system would belief these requests.

Subsequent, armed with the machine keys, the attacker can abuse the ASPX ViewState mechanism in deserialization assaults by forging ViewState payloads and attaining distant code execution.Commercial. Scroll to proceed studying.

The ViewState deserialization situation has been exploited this yr in assaults concentrating on two different CentreStack vulnerabilities, particularly CVE-2025-30406 and CVE-2025-11371.

Huntress additionally found that the attackers crafted their malicious requests to create a ticket that by no means expires, which basically permits them to reuse the identical URL indefinitely to retrieve the configuration file.

“As of December 10, we’ve seen 9 organizations which have been impacted by this vulnerability. These companies ranged throughout completely different sectors, from healthcare to know-how,” Huntress notes.

No CVE identifier has been printed for the flaw and Gladinet has not shared particulars on it. Nevertheless, the corporate notified its prospects in late November of a safety situation resolved with a brand new CentreStack replace (model 16.11.10417.56762).

Organizations are suggested to replace to the most recent model of CentreStack and Triofox, particularly model 16.12.10420.56791, which was launched on December 10, and to evaluation the indications of compromise (IoCs) launched by Huntress and Gladinet.

Associated: Latest GeoServer Vulnerability Exploited in Assaults

Associated: Unpatched Gogs Zero-Day Exploited for Months

Associated: Crucial King Addons Vulnerability Exploited to Hack WordPress Websites

Associated: Microsoft Silently Mitigated Exploited LNK Vulnerability

Security Week News Tags:CentreStack, Exploited, Flaw, Gladinet, Hack, Organizations

Post navigation

Previous Post: Fieldtex Data Breach Impacts 238,000
Next Post: New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Related Posts

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing Security Week News
Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
160,000 Impacted by Wayne Memorial Hospital Data Breach Security Week News
Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps Security Week News
Casie Antalis Named Executive Director of CISA Security Week News
How Software Development Teams Can Securely and Ethically Deploy AI Tools Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark