Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • How to reduce financial stress during the holiday season
  • The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Sunday, December 14
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities
Cybersecurity

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

By adminApril 14, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 171


Security researchers at Huntress are documenting active exploitation of a critical vulnerability in Gladinet CentreStack and Triofox software, where default cryptographic configurations have enabled attacks against seven organizations and triggered anomalous activity on roughly 120 endpoints.

The flaw, tagged as CVE-2025-30406, was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog in early April and carries a CVSS severity score of 9/10.

The vulnerability stems from hard coded cryptographic keys embedded by default in the configuration files of both CentreStack and Triofox, a misconfiguration that has left servers exposed to remote code execution attacks.

In this case, exploiting the default keys allows an attacker to bypass ASPX ViewState protections and execute code as the IIS application pool user, with potential escalation to full system control.

Huntress said its security operations center flagged the anomaly on April 11 when an internal detector, custom-built to catch zero-day exploits, flagged abnormal outbound connections emerging from an irregular child process of the IIS worker process. 

The company said this initial detection, highlighted by a suspicious process tree originating from Powershell, set off a cascade of alerts, as malware hunters pieced together evidence from failed ViewState verifications and other indicators visible in Windows Event Logs.

The company said the exploits followed a well-known playbook. Once a vulnerable server is identified, threat actors issue carefully crafted PowerShell commands to trigger the vulnerability, ultimately leading to remote code execution. 

In one instance, Huntress researchers say they traced a command sequence involving an encoded PowerShell directive intended to download and execute a DLL, an approach seen in recent attacks on CrushFTP software vulnerabilities.

Advertisement. Scroll to continue reading.

“There are a few hundred vulnerable servers exposed to the public Internet according to Shodan. While this may be a relatively small number, the risk of immediate compromise is still severe,” Huntress warned.

Huntress said it observed the threat actors moving laterally within networks, leveraging tools such as MeshCentral to maintain remote access. The company said the hackers also attempted to add new user accounts, execute standard enumeration commands, and employ default Impacket scripts.

Gradient has shipped patches and acknowledged the remote code execution risks. 

“We can confirm the Gladinet CentreStack and Triofox patches are effective in stopping exploitation from our tested proof-of-concept,” Huntress said.

Related: Vulnerability in OttoKit WordPress Plugin Exploited in the Wild

Related: Incomplete Nvidia Patch Leaves AI Containers Exposed

Related: Rapid7 Reveals RCE Path in Ivanti  Appliance After Silent Patch Debacle

Related: Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist

December 11, 2025

Photo by JORG CARSTENSEN/dpa/AFP via Getty ImagesOn Tuesday, billionaire philanthropist MacKenzie Scott published her yearly…

Indonesian Billionaires Cash In On Gold Surge

December 10, 2025

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025
Our Picks

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.