Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Gladinet CentreStack Flaw Exploited to Hack Organizations

Threat actors have hacked at least nine organizations by exploiting the recently patched Gladinet CentreStack flaw.

Hacked

Huntress warns of a new wave of attacks targeting Gladinet CentreStack instances to retrieve cryptographic keys and achieve remote code execution.

As part of the attacks, hackers have exploited a new vulnerability in the mobile access and secure sharing solution, the cybersecurity firm says.

The exploited bug, Huntress says, is an insecure cryptography issue that allows attackers to access the ‘web. config’ file, which contains a ‘machineKey’ cryptographic key.

Huntress’s analysis of the attacks revealed that the hackers have been abusing the fact that CentreStack relies on the same two 100-byte strings to derive the cryptographic keys.

According to the cybersecurity firm, an attacker that can retrieve this cryptographic information can also use it for future encryption/decryption operations, thus compromising the instance.

“Because these keys never change, we could extract them from memory once and use them to decrypt any ticket generated by the server or worse, encrypt our own,” Huntress notes.

Advertisement. Scroll to continue reading.

Using the two strings, any attacker could craft requests to obtain the machine keys from the ‘web. config’ file, and the system would trust those requests.

Next, armed with the machine keys, the attacker can abuse the ASPX ViewState mechanism in deserialization attacks by forging ViewState payloads and achieving remote code execution.

The ViewState deserialization issue has been exploited this year in attacks targeting two other CentreStack vulnerabilities, namely CVE-2025-30406 and CVE-2025-11371.

Huntress also discovered that the attackers crafted their malicious requests to create a ticket that never expires, which essentially allows them to reuse the same URL indefinitely to retrieve the configuration file.

“As of December 10, we have seen nine organizations that have been impacted by this vulnerability. These businesses ranged across different sectors, from healthcare to technology,” Huntress notes.

No CVE identifier has been published for the flaw and Gladinet has not shared details on it. However, the company notified its customers in late November of a security issue resolved with a new CentreStack update (version 16.11.10417.56762).

Organizations are advised to update to the latest version of CentreStack and Triofox, namely version 16.12.10420.56791, which was released on December 10, and to review the indicators of compromise (IoCs) released by Huntress and Gladinet.

Related: Recent GeoServer Vulnerability Exploited in Attacks

Related: Unpatched Gogs Zero-Day Exploited for Months

Related: Critical King Addons Vulnerability Exploited to Hack WordPress Sites

Related: Microsoft Silently Mitigated Exploited LNK Vulnerability

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.