Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gladinet CentreStack Flaw Exploited to Hack Organizations

Posted on December 12, 2025December 12, 2025 By CWS

Huntress warns of a brand new wave of assaults concentrating on Gladinet CentreStack cases to retrieve cryptographic keys and obtain distant code execution.

As a part of the assaults, hackers have exploited a brand new vulnerability within the cell entry and safe sharing answer, the cybersecurity agency says.

The exploited bug, Huntress says, is an insecure cryptography situation that enables attackers to entry the ‘net. config’ file, which accommodates a ‘machineKey’ cryptographic key.

Huntress’s evaluation of the assaults revealed that the hackers have been abusing the truth that CentreStack depends on the identical two 100-byte strings to derive the cryptographic keys.

Based on the cybersecurity agency, an attacker that may retrieve this cryptographic info also can use it for future encryption/decryption operations, thus compromising the occasion.

“As a result of these keys by no means change, we might extract them from reminiscence as soon as and use them to decrypt any ticket generated by the server or worse, encrypt our personal,” Huntress notes.

Utilizing the 2 strings, any attacker might craft requests to acquire the machine keys from the ‘net. config’ file, and the system would belief these requests.

Subsequent, armed with the machine keys, the attacker can abuse the ASPX ViewState mechanism in deserialization assaults by forging ViewState payloads and attaining distant code execution.Commercial. Scroll to proceed studying.

The ViewState deserialization situation has been exploited this yr in assaults concentrating on two different CentreStack vulnerabilities, particularly CVE-2025-30406 and CVE-2025-11371.

Huntress additionally found that the attackers crafted their malicious requests to create a ticket that by no means expires, which basically permits them to reuse the identical URL indefinitely to retrieve the configuration file.

“As of December 10, we’ve seen 9 organizations which have been impacted by this vulnerability. These companies ranged throughout completely different sectors, from healthcare to know-how,” Huntress notes.

No CVE identifier has been printed for the flaw and Gladinet has not shared particulars on it. Nevertheless, the corporate notified its prospects in late November of a safety situation resolved with a brand new CentreStack replace (model 16.11.10417.56762).

Organizations are suggested to replace to the most recent model of CentreStack and Triofox, particularly model 16.12.10420.56791, which was launched on December 10, and to evaluation the indications of compromise (IoCs) launched by Huntress and Gladinet.

Associated: Latest GeoServer Vulnerability Exploited in Assaults

Associated: Unpatched Gogs Zero-Day Exploited for Months

Associated: Crucial King Addons Vulnerability Exploited to Hack WordPress Websites

Associated: Microsoft Silently Mitigated Exploited LNK Vulnerability

Security Week News Tags:CentreStack, Exploited, Flaw, Gladinet, Hack, Organizations

Post navigation

Previous Post: Top 20 Most Exploited Vulnerabilities of 2025
Next Post: New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Related Posts

Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Sedgwick Confirms Cyberattack on Government Subsidiary Security Week News
MI5 Warns Lawmakers That Chinese Spies Are Trying to Reach Them via LinkedIn Security Week News
437,000 Impacted by Ascension Health Data Breach Security Week News
Over 30 Vulnerabilities Patched in Android Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround
  • Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild
  • WhatsApp Boosts Account Security for At-Risk Individuals
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome Security Update Patches Background Fetch API Vulnerability
  • Password Reuse in Disguise: An Often-Missed Risky Workaround
  • Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild
  • WhatsApp Boosts Account Security for At-Risk Individuals
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark