Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480

0
Medium
Published: Mon Nov 10 2025 (11/10/2025, 21:58:59 UTC)
Source: AlienVault OTX General

Description

CVE-2025-12480 is a critical vulnerability in Gladinet's Triofox file-sharing platform that allows unauthenticated attackers to access configuration pages and execute arbitrary payloads. Exploited by threat actor UNC6485 since August 2025, the attack chain involves HTTP host header manipulation and abuse of Triofox's built-in anti-virus feature to run malicious scripts. Attackers create admin accounts, deploy remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, and establish encrypted command-and-control tunnels. The vulnerability affects Triofox version 16. 4. 10317. 56372 and was patched in version 16. 7. 10368. 56560.

AI-Powered Analysis

AILast updated: 11/11/2025, 10:01:09 UTC

Technical Analysis

CVE-2025-12480 is a critical unauthenticated remote code execution vulnerability in Gladinet's Triofox file-sharing platform, specifically affecting version 16.4.10317.56372. The flaw allows attackers to bypass authentication and gain access to configuration pages by manipulating HTTP host headers. The exploit chain further abuses the platform's built-in anti-virus feature to execute arbitrary malicious scripts, enabling attackers to create administrative accounts and deploy remote access tools such as Zoho UEMS, Zoho Assist, and AnyDesk. The threat actor UNC6485 has been observed exploiting this vulnerability since August 24, 2025, conducting reconnaissance, privilege escalation, and establishing encrypted tunnels for command-and-control communications. This multi-stage attack leverages several MITRE ATT&CK techniques including T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1574.001 (Hijack Execution Flow: DLL Side-Loading), and T1569.002 (System Services: Service Execution). The vulnerability was patched in Triofox version 16.7.10368.56560. Indicators of compromise include specific file hashes and IP addresses linked to the attacker infrastructure. The attack requires no authentication or user interaction, making it highly exploitable and dangerous for organizations relying on Triofox for secure file sharing and collaboration.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of sensitive data shared via Triofox. Unauthorized administrative access allows attackers to manipulate configurations, deploy persistent remote access tools, and potentially move laterally within networks. The ability to execute arbitrary code without authentication can lead to data exfiltration, ransomware deployment, or disruption of business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Triofox for file sharing are particularly vulnerable. The exploitation could undermine trust in file-sharing platforms and cause regulatory compliance issues under GDPR due to potential data breaches. The use of encrypted tunnels for command-and-control complicates detection and response, increasing the risk of prolonged undetected intrusions. The medium severity rating may underestimate the real-world impact given the ease of exploitation and the critical nature of the access gained.

Mitigation Recommendations

European organizations should immediately verify their Triofox version and upgrade to version 16.7.10368.56560 or later to patch CVE-2025-12480. Network segmentation should be enforced to limit access to Triofox servers, and strict firewall rules should restrict inbound traffic to trusted sources. Implement robust monitoring for unusual HTTP host header values and suspicious anti-virus feature activity indicative of exploitation attempts. Deploy endpoint detection and response (EDR) solutions to detect the use of remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, especially if installed without authorization. Conduct regular audits of administrative accounts on Triofox to identify unauthorized creations. Employ multi-factor authentication (MFA) on all administrative interfaces where possible, even if the vulnerability bypasses authentication, to add defense in depth. Incident response plans should include procedures for isolating compromised systems and analyzing encrypted tunnels for command-and-control traffic. Finally, raise user awareness about the risks of unauthorized remote access tools and ensure timely application of security patches.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480"]
Adversary
UNC6485
Pulse Id
691260231a04d225ffb91c93
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-12480

Hash

ValueDescriptionCopy
hash269ce7b3a3fcdf735cd8a37c04abfdae
hash36e31f610eef3223154e6e8fd074190f
hash803278de3514dbf83a5b6f39c99f4000
hash1f2800382cd71163c10e5ce0a32b60297489fbb5
hash46ddfbbb5b4193279b9e024a5d013f5d825fcdf5
hash481aae12b0abc29fa19f6b7af5d66ef6f811e999
hash16cbe40fb24ce2d422afddb5a90a5801ced32ef52c22c2fc77b25a90837f28ad
hash43c455274d41e58132be7f66139566a941190ceba46082eb2ad7a6a261bfd63f
hash50479953865b30775056441b10fdcb984126ba4f98af4f64756902a807b453e7
hashac7f226bdf1c6750afa6a03da2b483eee2ef02cd9c2d6af71ea7c6a9a4eace2f

Ip

ValueDescriptionCopy
ip216.107.136.46

Url

ValueDescriptionCopy
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip'

Threat ID: 691308308240c40e4c090aa8

Added to database: 11/11/2025, 9:56:00 AM

Last enriched: 11/11/2025, 10:01:09 AM

Last updated: 11/11/2025, 5:27:34 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats