By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
Computing

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

News Room
Last updated: 2025/12/11 at 2:07 AM
News Room Published 11 December 2025
Share
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
SHARE

Dec 11, 2025Ravie LakshmananVulnerability / Encryption

Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.

“Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution,” security researcher Bryan Masters said.

The use of hard-coded cryptographic keys could allow threat actors to decrypt or forge access tickets, enabling them to access sensitive files like web.config that can be exploited to achieve ViewState deserialization and remote code execution, the cybersecurity company added.

At its core, the issue is rooted in a function named “GenerateSecKey()” present in “GladCtrl64.dll” that’s used to generate the cryptographic keys necessary to encrypt access tickets containing authorization data (i.e., Username and Password) and enable access to the file system as a user, assuming the credentials are valid.

Cybersecurity

Because the GenerateSecKey() function returns the same 100-byte text strings and these strings are used to derive the cryptographic keys, the keys never change and can be weaponized to decrypt any ticket generated by the server or even encrypt one of the attacker’s choosing.

This, in turn, opens the door to a scenario where it can be exploited to access files containing valuable data, such as the web.config file, and obtain the machine key required to perform remote code execution via ViewState deserialization.

The attacks, according to Huntress, take the form of specially crafted URL requests to the “/storage/filesvr.dn” endpoint, such as below –

/storage/filesvr.dn t=vghpI7EToZUDIZDdprSubL3mTZ2:aCLI:8Zra5AOPvX4TEEXlZiueqNysfRx7Dsd3P5l6eiYyDiG8Lvm0o41m:ZDplEYEsO5ksZajiXcsumkDyUgpV5VLxL%7C372varAu

The attack efforts have been found to leave the Username and Password fields blank, causing the application to fall back to the IIS Application Pool Identity. What’s more, the timestamp field in the access ticket, which refers to the creation time of the ticket, is set to 9999, effectively creating a ticket that never expires, allowing the threat actors to reuse the URL indefinitely and download the server configuration.

As of December 10, as many as nine organizations have been affected by the newly disclosed flaw. These organizations belong to a wide range of sectors, such as healthcare and technology. The attacks originate from the IP address 147.124.216[.]205 and attempt to chain together a previously disclosed flaw in the same applications (CVE-2025-11371) with the new exploit to access the machine key from the web.config file.

“Once the attacker was able to obtain the keys, they performed a viewstate deserialization attack and then attempted to retrieve the output of the execution, which failed,” Huntress said.

In light of active exploitation, organizations that are using CentreStack and Triofox should update to the latest version, 16.12.10420.56791, released on December 8, 2025. Additionally, it’s advised to scan logs for the presence of the string “vghpI7EToZUDIZDdprSubL3mTZ2,” which is the encrypted representation of the web.config file path.

Cybersecurity

In the event indicators or compromise (IoCs) are detected, it’s imperative that the machine key is rotated by following the steps below –

  • On Centrestack server, go to Centrestack installation folder C:Program Files (x86)Gladinet Cloud Enterpriseroot
  • Make a backup of web.config
  • Open IIS Manager
  • Navigate to Sites -> Default Web Site
  • In the ASP.NET section, double click Machine Key
  • Click ‘Generate Keys’ on the right pane
  • Click Apply to save it to rootweb.config
  • Restart IIS after repeating the same step for all worker nodes

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Attorneys general urge Apple and other tech giants to curb harmful AI outputs Attorneys general urge Apple and other tech giants to curb harmful AI outputs
Next Article Rubio Demands State Dept. Swap ‘Radical’ Calibri Font for Times New Roman Rubio Demands State Dept. Swap ‘Radical’ Calibri Font for Times New Roman
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best Apple deal: Save .01 on Apple AirPods 4 ANC
Best Apple deal: Save $79.01 on Apple AirPods 4 ANC
News
Meet the 31-year-old coach who has already worked with Guardiola, Kompany and Bellamy
Software
Apple Music and Apple TV Experiencing Outage [Update: Fixed]
Apple Music and Apple TV Experiencing Outage [Update: Fixed]
News
China Just Launched Their Most Advanced Aircraft Carrier With Electromagnetic Catapults – BGR
China Just Launched Their Most Advanced Aircraft Carrier With Electromagnetic Catapults – BGR
News

You Might also Like

NVIDIA’s H200 wins approval but its entry into China remains uncertain · TechNode
Computing

NVIDIA’s H200 wins approval but its entry into China remains uncertain · TechNode

3 Min Read
China car production and sales exceed 31 million in Jan–Nov, up over 10% · TechNode
Computing

China car production and sales exceed 31 million in Jan–Nov, up over 10% · TechNode

1 Min Read
👨🏿‍🚀 Daily – Two for the Price of one |
Computing

👨🏿‍🚀 Daily – Two for the Price of one |

4 Min Read
TSMC announces additional 0 billion investment in US chip expansion · TechNode
Computing

TSMC announces additional $100 billion investment in US chip expansion · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?