Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14611: Vulnerability in Gladinet CentreStack and TrioFox

0
High
VulnerabilityCVE-2025-14611cvecve-2025-14611
Published: Fri Dec 12 2025 (12/12/2025, 21:01:13 UTC)
Source: CVE Database V5
Vendor/Project: Gladinet
Product: CentreStack and TrioFox

Description

Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:30:53 UTC

Technical Analysis

CVE-2025-14611 identifies a cryptographic vulnerability in Gladinet CentreStack and TrioFox software versions prior to 16.12.10420.56791. These products implement the AES encryption scheme using hardcoded cryptographic values, violating best practices for key management and significantly degrading the confidentiality guarantees of encrypted data. The vulnerability specifically affects publicly exposed endpoints that rely on this AES implementation, making them susceptible to attacks without requiring authentication or user interaction. Exploiting this flaw allows attackers to perform arbitrary local file inclusion (LFI) by sending specially crafted requests, which can lead to disclosure or manipulation of sensitive files on the server. This LFI can be chained with previously known vulnerabilities in the software to escalate privileges and achieve full system compromise. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction required, but with low impact on confidentiality and no impact on integrity or availability. Despite the lack of known exploits in the wild, the vulnerability poses a serious risk due to the potential for future exploitation and the critical nature of the affected products, which are used for cloud storage and file sharing in enterprise environments. The CWE-798 classification highlights the use of hardcoded credentials or cryptographic keys, a common and dangerous security anti-pattern. No official patches are currently linked, so mitigation relies on network controls and monitoring until updates are released.

Potential Impact

The vulnerability undermines the cryptographic security of Gladinet CentreStack and TrioFox, potentially exposing sensitive data transmitted or stored via these platforms. Arbitrary local file inclusion can lead to unauthorized access to configuration files, credentials, or other critical system files, enabling attackers to pivot within the environment. Combined with other vulnerabilities, this could result in full system compromise, including data theft, ransomware deployment, or disruption of cloud storage services. Organizations relying on these products for file sharing and cloud storage face risks to confidentiality, integrity, and availability of their data. The public exposure of vulnerable endpoints increases the attack surface, especially for enterprises with internet-facing deployments. The absence of authentication requirements for exploitation further elevates risk, making it easier for remote attackers to exploit the flaw. This can lead to significant operational disruptions, regulatory compliance violations, and reputational damage.

Mitigation Recommendations

Until official patches are released, organizations should immediately restrict network access to CentreStack and TrioFox endpoints, limiting exposure to trusted internal networks only. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious requests indicative of local file inclusion attempts. Conduct thorough audits of existing deployments to identify publicly accessible endpoints and remove or isolate them. Monitor logs for unusual file access patterns or error messages related to file inclusion. Engage with Gladinet support to obtain timelines for patches and apply updates promptly once available. Consider implementing additional encryption layers or VPN tunnels to protect data in transit. Review and harden server configurations to minimize the impact of potential file inclusion, such as disabling unnecessary file system permissions and isolating application processes. Educate security teams about this vulnerability to improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Huntress
Date Reserved
2025-12-12T20:22:27.367Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c8579f55ccbd2c799d2b7

Added to database: 12/12/2025, 9:13:29 PM

Last enriched: 2/27/2026, 6:30:53 AM

Last updated: 3/26/2026, 6:43:09 AM

Views: 324

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses