By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
Tech News

Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks

By admin 4 Min Read
Share
SHARE

Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in Gladinet’s CentreStack and Triofox products for secure remote file access and sharing.

By leveraging the security issue, the attackers can obtain hardcoded cryptographic keys and achieve remote code execution, researchers warn.

Although the new cryptographic vulnerability does not have an official identifier, Gladinet notified customers about it and advised them to update the products to the latest version, which, at the time of the communication, had been released on November 29.

The company also provided customers with a set of indicators of compromise (IoCs), indicating that the issue was being exploited in the wild.

Security researchers at managed cybersecurity platform Huntress are aware of at least nine organizations targeted in attacks leveraging the new vulnerability along with an older one tracked as CVE-2025-30406 – a local file inclusion flaw that allows a local attacker to access system files without authentication.

Hardcoded cryptographic keys

Using the IoCs from Gladinet, Huntress researchers were able to determine where the flaw was and how threat actors are leveraging it.

Huntress found that the issue stems from the custom implementation of the AES cryptographic algorithm in Gladinet CentreStack and Triofox, where the encryption key and Initialization Vector (IV) were hardcoded inside the GladCtrl64.dll file and could be easily obtained.

Specifically, the key values were derived from two static 100-byte strings of Chinese and Japanese text, which were identical across all product installations.

The flaw lies in the processing of the ‘filesvr.dn’ handler, which decrypts the ‘t’ parameter (Access Ticket) using those static keys, Huntress explains.

Anyone extracting those keys could decrypt the Access Tickets containing file paths, usernames, passwords, and timestamps, or create their own to impersonate users and instruct servers to return any file on the disk.

“Because these keys never change, we could extract them from memory once and use them to decrypt any ticket generated by the server or worse, encrypt our own,” the researchers say.

Huntress observed that Access Tickets were forged using hardcoded AES keys and setting the timestamp to year 9999, so the ticket never expires.

The attackers next requested the server’s web.config file. Since it contains the machineKey, they were able to use it to trigger remote code execution through a ViewState deserialization flaw.

Exploitation activity
<strong>Exploitation activity</strong><br /><em>Source: Huntress</em>

Besides an attacking IP address, 147.124.216[.]205, no specific attribution has been made for those attacks.

Regarding the targets, Huntress confirmed nine organizations as of December 10, from various sectors, including healthcare and technology.

Users of Gladinet CentreStack and Triofox are recommended to upgrade to version 16.12.10420.56791 (released on December 8) as soon as possible and also rotate the machine keys.

Additionally, it is recommended to scan logs for the ‘vghpI7EToZUDIZDdprSubL3mTZ2’ string, which is associated with the encrypted file path, and is considered the only reliable indicator of compromise.

Huntress provides mitigation guidance in its report, along with indicators of compromise that defenders can use to protect their environments or determine if they were breached.

tines

Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

You Might Also Like

Best New Tablet of the Year: Tech Advisor Awards 2025-26

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs

Social Voice social media intelligence Spark Venture Funding

MediSnap helping vulnerable patients, Declan Watters

TAGGED: Actively Exploited, Cryptography, Gladinet CentreStack, Gladinet Triofox, Hardcoded Key, Key, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article The First Supergirl Trailer Has A Great Line About What Makes Her Different From Superman
Next Article Migration remains an opportunity for Europe, Spanish economy minister tells Euronews
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Liverpool set-piece coach leaves club amid woeful record this season
Sports
Dragonfly’s Haseeb Qureshi Unveils His Crypto Predictions For 2026
Crypto
Best New Tablet of the Year: Tech Advisor Awards 2025-26
Tech News
Why Singapore is the only Southeast Asian country in Pax Silica, the U.S.’s new AI ‘inner circle’
Business
South Korea delays digital asset law as stablecoin oversight divides regulators
Crypto
Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage
World News
Where Is Brigitte Bardot’s Son Nicolas-Jacques Charrier Now? His Life Today
Celebrity

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Liverpool set-piece coach leaves club amid woeful record this season

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Liverpool set-piece coach leaves club amid woeful record this season
December 30, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?