Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
A critical vulnerability in Gladinet's Triofox file-sharing platform, CVE-2025-12480, allowed unauthenticated access to configuration pages, enabling arbitrary payload execution. Threat actor UNC6485 exploited this flaw as early as August 24, 2025, bypassing authentication and chaining it with anti-virus feature abuse for code execution. The vulnerability affected Triofox version 16.4.10317.56372 and was patched in version 16.7.10368.56560. Attackers created admin accounts, deployed remote access tools, conducted reconnaissance, and attempted privilege escalation. They used Zoho UEMS, Zoho Assist, and Anydesk for remote access, and set up encrypted tunnels for C2 communication. The exploit chain involved HTTP host header manipulation and abuse of the built-in anti-virus feature to execute malicious scripts.
AI Analysis
Technical Summary
CVE-2025-12480 is a critical unauthenticated remote code execution vulnerability in Gladinet's Triofox file-sharing platform, specifically affecting version 16.4.10317.56372. The flaw allows attackers to bypass authentication and gain access to configuration pages by manipulating HTTP host headers. The exploit chain further abuses the platform's built-in anti-virus feature to execute arbitrary malicious scripts, enabling attackers to create administrative accounts and deploy remote access tools such as Zoho UEMS, Zoho Assist, and AnyDesk. The threat actor UNC6485 has been observed exploiting this vulnerability since August 24, 2025, conducting reconnaissance, privilege escalation, and establishing encrypted tunnels for command-and-control communications. This multi-stage attack leverages several MITRE ATT&CK techniques including T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1574.001 (Hijack Execution Flow: DLL Side-Loading), and T1569.002 (System Services: Service Execution). The vulnerability was patched in Triofox version 16.7.10368.56560. Indicators of compromise include specific file hashes and IP addresses linked to the attacker infrastructure. The attack requires no authentication or user interaction, making it highly exploitable and dangerous for organizations relying on Triofox for secure file sharing and collaboration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of sensitive data shared via Triofox. Unauthorized administrative access allows attackers to manipulate configurations, deploy persistent remote access tools, and potentially move laterally within networks. The ability to execute arbitrary code without authentication can lead to data exfiltration, ransomware deployment, or disruption of business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Triofox for file sharing are particularly vulnerable. The exploitation could undermine trust in file-sharing platforms and cause regulatory compliance issues under GDPR due to potential data breaches. The use of encrypted tunnels for command-and-control complicates detection and response, increasing the risk of prolonged undetected intrusions. The medium severity rating may underestimate the real-world impact given the ease of exploitation and the critical nature of the access gained.
Mitigation Recommendations
European organizations should immediately verify their Triofox version and upgrade to version 16.7.10368.56560 or later to patch CVE-2025-12480. Network segmentation should be enforced to limit access to Triofox servers, and strict firewall rules should restrict inbound traffic to trusted sources. Implement robust monitoring for unusual HTTP host header values and suspicious anti-virus feature activity indicative of exploitation attempts. Deploy endpoint detection and response (EDR) solutions to detect the use of remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, especially if installed without authorization. Conduct regular audits of administrative accounts on Triofox to identify unauthorized creations. Employ multi-factor authentication (MFA) on all administrative interfaces where possible, even if the vulnerability bypasses authentication, to add defense in depth. Incident response plans should include procedures for isolating compromised systems and analyzing encrypted tunnels for command-and-control traffic. Finally, raise user awareness about the risks of unauthorized remote access tools and ensure timely application of security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
Indicators of Compromise
- cve: CVE-2025-12480
- hash: 269ce7b3a3fcdf735cd8a37c04abfdae
- hash: 36e31f610eef3223154e6e8fd074190f
- hash: 803278de3514dbf83a5b6f39c99f4000
- hash: 1f2800382cd71163c10e5ce0a32b60297489fbb5
- hash: 46ddfbbb5b4193279b9e024a5d013f5d825fcdf5
- hash: 481aae12b0abc29fa19f6b7af5d66ef6f811e999
- hash: 16cbe40fb24ce2d422afddb5a90a5801ced32ef52c22c2fc77b25a90837f28ad
- hash: 43c455274d41e58132be7f66139566a941190ceba46082eb2ad7a6a261bfd63f
- hash: 50479953865b30775056441b10fdcb984126ba4f98af4f64756902a807b453e7
- hash: ac7f226bdf1c6750afa6a03da2b483eee2ef02cd9c2d6af71ea7c6a9a4eace2f
- ip: 216.107.136.46
- url: http://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip
- url: http://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip'
Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
Description
A critical vulnerability in Gladinet's Triofox file-sharing platform, CVE-2025-12480, allowed unauthenticated access to configuration pages, enabling arbitrary payload execution. Threat actor UNC6485 exploited this flaw as early as August 24, 2025, bypassing authentication and chaining it with anti-virus feature abuse for code execution. The vulnerability affected Triofox version 16.4.10317.56372 and was patched in version 16.7.10368.56560. Attackers created admin accounts, deployed remote access tools, conducted reconnaissance, and attempted privilege escalation. They used Zoho UEMS, Zoho Assist, and Anydesk for remote access, and set up encrypted tunnels for C2 communication. The exploit chain involved HTTP host header manipulation and abuse of the built-in anti-virus feature to execute malicious scripts.
AI-Powered Analysis
Technical Analysis
CVE-2025-12480 is a critical unauthenticated remote code execution vulnerability in Gladinet's Triofox file-sharing platform, specifically affecting version 16.4.10317.56372. The flaw allows attackers to bypass authentication and gain access to configuration pages by manipulating HTTP host headers. The exploit chain further abuses the platform's built-in anti-virus feature to execute arbitrary malicious scripts, enabling attackers to create administrative accounts and deploy remote access tools such as Zoho UEMS, Zoho Assist, and AnyDesk. The threat actor UNC6485 has been observed exploiting this vulnerability since August 24, 2025, conducting reconnaissance, privilege escalation, and establishing encrypted tunnels for command-and-control communications. This multi-stage attack leverages several MITRE ATT&CK techniques including T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1574.001 (Hijack Execution Flow: DLL Side-Loading), and T1569.002 (System Services: Service Execution). The vulnerability was patched in Triofox version 16.7.10368.56560. Indicators of compromise include specific file hashes and IP addresses linked to the attacker infrastructure. The attack requires no authentication or user interaction, making it highly exploitable and dangerous for organizations relying on Triofox for secure file sharing and collaboration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of sensitive data shared via Triofox. Unauthorized administrative access allows attackers to manipulate configurations, deploy persistent remote access tools, and potentially move laterally within networks. The ability to execute arbitrary code without authentication can lead to data exfiltration, ransomware deployment, or disruption of business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Triofox for file sharing are particularly vulnerable. The exploitation could undermine trust in file-sharing platforms and cause regulatory compliance issues under GDPR due to potential data breaches. The use of encrypted tunnels for command-and-control complicates detection and response, increasing the risk of prolonged undetected intrusions. The medium severity rating may underestimate the real-world impact given the ease of exploitation and the critical nature of the access gained.
Mitigation Recommendations
European organizations should immediately verify their Triofox version and upgrade to version 16.7.10368.56560 or later to patch CVE-2025-12480. Network segmentation should be enforced to limit access to Triofox servers, and strict firewall rules should restrict inbound traffic to trusted sources. Implement robust monitoring for unusual HTTP host header values and suspicious anti-virus feature activity indicative of exploitation attempts. Deploy endpoint detection and response (EDR) solutions to detect the use of remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, especially if installed without authorization. Conduct regular audits of administrative accounts on Triofox to identify unauthorized creations. Employ multi-factor authentication (MFA) on all administrative interfaces where possible, even if the vulnerability bypasses authentication, to add defense in depth. Incident response plans should include procedures for isolating compromised systems and analyzing encrypted tunnels for command-and-control traffic. Finally, raise user awareness about the risks of unauthorized remote access tools and ensure timely application of security patches.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480"]
- Adversary
- UNC6485
- Pulse Id
- 691260231a04d225ffb91c93
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-12480 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash269ce7b3a3fcdf735cd8a37c04abfdae | — | |
hash36e31f610eef3223154e6e8fd074190f | — | |
hash803278de3514dbf83a5b6f39c99f4000 | — | |
hash1f2800382cd71163c10e5ce0a32b60297489fbb5 | — | |
hash46ddfbbb5b4193279b9e024a5d013f5d825fcdf5 | — | |
hash481aae12b0abc29fa19f6b7af5d66ef6f811e999 | — | |
hash16cbe40fb24ce2d422afddb5a90a5801ced32ef52c22c2fc77b25a90837f28ad | — | |
hash43c455274d41e58132be7f66139566a941190ceba46082eb2ad7a6a261bfd63f | — | |
hash50479953865b30775056441b10fdcb984126ba4f98af4f64756902a807b453e7 | — | |
hashac7f226bdf1c6750afa6a03da2b483eee2ef02cd9c2d6af71ea7c6a9a4eace2f | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip216.107.136.46 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip | — | |
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip' | — |
Threat ID: 691308308240c40e4c090aa8
Added to database: 11/11/2025, 9:56:00 AM
Last enriched: 11/11/2025, 10:01:09 AM
Last updated: 12/27/2025, 2:34:55 AM
Views: 268
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Pro-Russian group Noname057 claims cyberattack on La Poste services
MediumSilver Fox Targeting India Using Tax Themed Phishing Lures
MediumEvasive Panda APT poisons DNS requests to deliver MgBot
MediumLinearizing SHA-256 via fractional modular analysis (Kaoru Method)
Medium2025 Holiday Scams: Docusign Phishing Meets Loan Spam
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.