Gladinet Flaw: Hard-Coded Keys Enable Remote Code Execution Exploit

Critical Vulnerability in Gladinet CentreStack and Triofox Enables Unauthorized Access and Remote Code Execution Through Hard-Coded Cryptographic Keys

  • A vulnerability involving hard-coded cryptographic keys impacts Gladinet CentreStack and Triofox products.
  • Threat actors exploit the flaw to access sensitive files like web.config and perform remote code execution through ViewState deserialization.
  • The flaw relates to the static key generation by the “GenerateSecKey()” function in GladCtrl64.dll.
  • At least nine organizations across multiple sectors have been affected as of December 10, 2025.
  • Users are advised to update to the latest software version and rotate machine keys to mitigate the risk.

A new vulnerability affecting Gladinet CentreStack and Triofox software has been actively exploited, impacting at least nine organizations as of December 10, 2025. The flaw stems from hard-coded cryptographic keys embedded in the products, which allow attackers to access critical configuration files and execute remote code.

- Advertisement -

Security researcher Bryan Masters explained that threat actors can leverage this weakness to access the web.config file, enabling deserialization attacks through ViewState and leading to remote code execution. The problem originates from a function named “GenerateSecKey()” within the “GladCtrl64.dll” library. This function produces fixed 100-byte strings used to derive cryptographic keys, which remain unchanged over time.

Because these keys never change, attackers can decrypt or forge access tickets containing authorization data such as usernames and passwords. This grants unauthorized access to files and the ability to craft tickets that never expire by manipulating the timestamp field. The attacks typically target the “/storage/filesvr.dn” endpoint using specially crafted URL requests.

The intrusions leave username and password fields blank, causing the system to default to the IIS Application Pool Identity, which broadens unauthorized access. The reused tickets allow persistent access to sensitive data, including the machine key needed for ViewState deserialization exploits.

Affected organizations span healthcare, technology, and other sectors, with attacks traced to the IP address 147.124.216[.]205. The threat actors combine this vulnerability with a previously disclosed flaw (CVE-2025-11371) to access the machine key from the web.config file. According to Huntress, attackers performed deserialization attacks but encountered failures in retrieving execution output.

- Advertisement -

To address the issue, users of CentreStack and Triofox are urged to update their software to version 16.12.10420.56791, released on December 8, 2025, as indicated on the official CentreStack and Triofox release pages. Monitoring logs for the encrypted string “vghpI7EToZUDIZDdprSubL3mTZ2” is recommended to detect indicators of compromise.

If signs of exploitation are found, administrators should rotate machine keys following guidelines outlined here. The process involves backing up the web.config file, generating new machine keys in IIS Manager under the ASP.NET section, and restarting IIS on all worker nodes.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Malicious Go Module Hijacks Linux Passwords

A malicious Go module impersonates a legitimate "golang.org/x/crypto" library to steal secrets.The malware harvests...

Block Stock Jumps 18% on Layoffs, AI Shift

Block Inc (XYZ) stock surged up to 18% following CEO Jack Dorsey's announcement of...

South Korea’s Tax Service Leaks Secret Crypto Keys in Blunder

South Korea’s National Tax Service accidentally published seed phrases in a press photo, revealing...

Altman backs AI safeguards, eyes Pentagon deal despite rift

OpenAI CEO Sam Altman supports rival Anthropic's principle of enforcing AI safeguards in military...

Hedera Relay Aligns Defaults with Ethereum

The Hiero JSON-RPC Relay is updating default settings in its v0.77.0 release scheduled for...

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!