Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14611: Vulnerability in Gladinet CentreStack and TrioFox

0
High
VulnerabilityCVE-2025-14611cvecve-2025-14611
Published: Fri Dec 12 2025 (12/12/2025, 21:01:13 UTC)
Source: CVE Database V5
Vendor/Project: Gladinet
Product: CentreStack and TrioFox

Description

Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.

AI-Powered Analysis

AILast updated: 12/12/2025, 21:28:22 UTC

Technical Analysis

CVE-2025-14611 identifies a cryptographic vulnerability in Gladinet CentreStack and TrioFox software versions prior to 16.12.10420.56791. The core issue stems from the use of hardcoded values within the AES cryptoscheme implementation, which undermines the cryptographic strength and confidentiality guarantees of encrypted communications and stored data. This weakness is particularly concerning for publicly exposed endpoints that rely on this encryption for secure data exchange. Furthermore, the vulnerability allows for arbitrary local file inclusion (LFI) when an attacker sends a specially crafted request that does not require authentication. LFI can enable attackers to read or execute files on the server, potentially leading to privilege escalation or the execution of malicious code. Although no exploits have been observed in the wild yet, the vulnerability's existence increases the attack surface and can be chained with prior vulnerabilities in these products to achieve full system compromise. The CVSS 4.0 vector indicates the attack can be performed remotely over the network without user interaction or privileges but requires high attack complexity and strong security controls, which somewhat limits exploitation ease. The vulnerability affects confidentiality (due to weak encryption), integrity (through LFI), and potentially availability if exploited further. The lack of available patches at the time of disclosure necessitates immediate attention to exposure reduction and monitoring.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on Gladinet CentreStack and TrioFox for cloud storage, file sharing, and collaboration. The use of hardcoded cryptographic values compromises the confidentiality of sensitive data transmitted or stored, potentially exposing intellectual property, personal data, or regulated information. The arbitrary local file inclusion vulnerability could allow attackers to access or execute unauthorized files, leading to data breaches, ransomware deployment, or full system takeover. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure, where data integrity and confidentiality are paramount. Publicly exposed endpoints increase the attack surface, making organizations with internet-facing deployments more vulnerable. The ability to chain this vulnerability with previous ones amplifies the threat, potentially resulting in widespread compromise. The high CVSS score reflects the serious nature of the threat, although the high attack complexity and security requirements may limit immediate exploitation. Nonetheless, the potential impact on business continuity, regulatory compliance, and reputation is substantial.

Mitigation Recommendations

1. Immediately identify and inventory all instances of Gladinet CentreStack and TrioFox within the organization, focusing on versions prior to 16.12.10420.56791. 2. Restrict or disable public exposure of CentreStack and TrioFox endpoints until patches are available. Use network segmentation and firewall rules to limit access to trusted internal networks. 3. Monitor logs and network traffic for unusual or malformed requests that could indicate attempts to exploit the LFI vulnerability. 4. Implement strict input validation and web application firewall (WAF) rules to detect and block suspicious payloads targeting file inclusion. 5. Once vendor patches or updates are released, prioritize immediate deployment after testing in controlled environments. 6. Review and strengthen cryptographic configurations and key management practices to avoid hardcoded or weak cryptographic parameters in other systems. 7. Conduct security awareness training for administrators managing these platforms to recognize and respond to exploitation attempts. 8. Prepare incident response plans specifically addressing potential exploitation scenarios involving file inclusion and cryptographic weaknesses. 9. Collaborate with vendors and threat intelligence sources to stay informed about exploit developments and mitigation updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Huntress
Date Reserved
2025-12-12T20:22:27.367Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c8579f55ccbd2c799d2b7

Added to database: 12/12/2025, 9:13:29 PM

Last enriched: 12/12/2025, 9:28:22 PM

Last updated: 12/14/2025, 7:30:22 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats