Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Active attack exploits Gladinet’s hard-coded keys to gain unauthorized access and code execution
Identity

Active attack exploits Gladinet’s hard-coded keys to gain unauthorized access and code execution

userBy userDecember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 11, 2025Ravi LakshmananVulnerabilities/Encryption

Huntress warns that a new vulnerability in Gladinet’s CentreStack and Triofox products due to the use of hard-coded encryption keys is being actively exploited, affecting nine organizations so far.

“An attacker could exploit this as a way to access the web.config file, potentially opening the door to deserialization and remote code execution,” security researcher Brian Masters said.

Hardcoded cryptographic keys can allow an attacker to decrypt or forge access tickets, gaining access to sensitive files such as Web.config, which could be exploited for ViewState deserialization or remote code execution, the cybersecurity firm added.

The crux of the issue lies in a function named “GenerateSecKey()” located in “GladCtrl64.dll”. This function is used to encrypt the access ticket containing the authentication data (username and password) and generate the encryption key needed to allow you to access the file system as the user, assuming the credentials are valid.

cyber security

Because the GenerateSecKey() function returns the same 100-byte text strings and these strings are used to derive the cryptographic keys, the keys never change and can be weaponized to decrypt tickets generated by the server or to encrypt tickets of the attacker’s choosing.

This opens the door to a scenario where files containing valuable data, such as web.config files, can be exploited to obtain the machine key needed for remote code execution via ViewState deserialization.

According to Huntress, the attack takes the form of a specially crafted URL request to the “/storage/filesvr.dn” endpoint, similar to the following:

/storage/filesvr.dn t=vghpI7EToZUDIZDdprSubL3mTZ2:aCLI:8Zra5AOPvX4TEEXlZiueqNysfRx7Dsd3P5l6eiYyDiG8Lvm0o41m:ZDplEYEsO5ksZajiXcsumkDyUgpV5VLxL%7C372varAu

This attack was found to leave the username and password fields blank, causing the application to fall back to the IIS application pool identity. Additionally, the access ticket’s timestamp field, which indicates when the ticket was created, is set to 9999, effectively creating a ticket that never expires and allowing an attacker to reuse the URL indefinitely to download server configurations.

As of December 10th, there are nine organizations affected by the newly disclosed flaw. These organizations come from a wide range of sectors, including healthcare and technology. The attack originates from IP address 147.124.216.[.]205 and attempts to chain a previously disclosed flaw (CVE-2025-11371) in the same application with a new exploit that accesses machine keys from the web.config file.

“Once the attacker had the key, he attempted to perform a view state deserialization attack and retrieve the resulting output, but was unsuccessful,” Huntress said.

In light of active exploitation, organizations using CentreStack and Triofox should update to the latest version 16.12.10420.56791, released on December 8, 2025. Additionally, we recommend scanning the logs for the presence of the string “vghpI7EToZUDIZDdprSubL3mTZ2”, which is an encrypted representation of the web.config file path.

cyber security

If an indicator or compromise (IoC) is detected, it is mandatory to rotate the machine key by following the steps below.

On the Centrestack server, navigate to the Centrestack installation folder C:\Program Files (x86)\Gladinet Cloud Enterprise\root. Create a backup of web.config. Open IIS Manager.[サイト]->[既定の Web サイト]Move to. In the ASP.NET section, double-click the machine key. in the right pane[キーの生成]Click.[適用]Click and save to root\web.config. Repeat the same steps for all worker nodes, then restart IIS.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleContinuing the proud tradition that babies born with Waymo cannot go to the hospital.
Next Article Chrome targeted by active field exploit related to undisclosed high-severity flaw
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.