Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
CVE-2025-12480 is a critical vulnerability in Gladinet's Triofox file-sharing platform that allows unauthenticated attackers to access configuration pages and execute arbitrary payloads. Exploited by threat actor UNC6485 since August 2025, the attack chain involves HTTP host header manipulation and abuse of Triofox's built-in anti-virus feature to run malicious scripts. Attackers create admin accounts, deploy remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, and establish encrypted command-and-control tunnels. The vulnerability affects Triofox version 16. 4. 10317. 56372 and was patched in version 16. 7. 10368. 56560.
AI Analysis
Technical Summary
CVE-2025-12480 is a critical unauthenticated remote code execution vulnerability in Gladinet's Triofox file-sharing platform, specifically affecting version 16.4.10317.56372. The flaw allows attackers to bypass authentication and gain access to configuration pages by manipulating HTTP host headers. The exploit chain further abuses the platform's built-in anti-virus feature to execute arbitrary malicious scripts, enabling attackers to create administrative accounts and deploy remote access tools such as Zoho UEMS, Zoho Assist, and AnyDesk. The threat actor UNC6485 has been observed exploiting this vulnerability since August 24, 2025, conducting reconnaissance, privilege escalation, and establishing encrypted tunnels for command-and-control communications. This multi-stage attack leverages several MITRE ATT&CK techniques including T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1574.001 (Hijack Execution Flow: DLL Side-Loading), and T1569.002 (System Services: Service Execution). The vulnerability was patched in Triofox version 16.7.10368.56560. Indicators of compromise include specific file hashes and IP addresses linked to the attacker infrastructure. The attack requires no authentication or user interaction, making it highly exploitable and dangerous for organizations relying on Triofox for secure file sharing and collaboration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of sensitive data shared via Triofox. Unauthorized administrative access allows attackers to manipulate configurations, deploy persistent remote access tools, and potentially move laterally within networks. The ability to execute arbitrary code without authentication can lead to data exfiltration, ransomware deployment, or disruption of business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Triofox for file sharing are particularly vulnerable. The exploitation could undermine trust in file-sharing platforms and cause regulatory compliance issues under GDPR due to potential data breaches. The use of encrypted tunnels for command-and-control complicates detection and response, increasing the risk of prolonged undetected intrusions. The medium severity rating may underestimate the real-world impact given the ease of exploitation and the critical nature of the access gained.
Mitigation Recommendations
European organizations should immediately verify their Triofox version and upgrade to version 16.7.10368.56560 or later to patch CVE-2025-12480. Network segmentation should be enforced to limit access to Triofox servers, and strict firewall rules should restrict inbound traffic to trusted sources. Implement robust monitoring for unusual HTTP host header values and suspicious anti-virus feature activity indicative of exploitation attempts. Deploy endpoint detection and response (EDR) solutions to detect the use of remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, especially if installed without authorization. Conduct regular audits of administrative accounts on Triofox to identify unauthorized creations. Employ multi-factor authentication (MFA) on all administrative interfaces where possible, even if the vulnerability bypasses authentication, to add defense in depth. Incident response plans should include procedures for isolating compromised systems and analyzing encrypted tunnels for command-and-control traffic. Finally, raise user awareness about the risks of unauthorized remote access tools and ensure timely application of security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
Indicators of Compromise
- cve: CVE-2025-12480
- hash: 269ce7b3a3fcdf735cd8a37c04abfdae
- hash: 36e31f610eef3223154e6e8fd074190f
- hash: 803278de3514dbf83a5b6f39c99f4000
- hash: 1f2800382cd71163c10e5ce0a32b60297489fbb5
- hash: 46ddfbbb5b4193279b9e024a5d013f5d825fcdf5
- hash: 481aae12b0abc29fa19f6b7af5d66ef6f811e999
- hash: 16cbe40fb24ce2d422afddb5a90a5801ced32ef52c22c2fc77b25a90837f28ad
- hash: 43c455274d41e58132be7f66139566a941190ceba46082eb2ad7a6a261bfd63f
- hash: 50479953865b30775056441b10fdcb984126ba4f98af4f64756902a807b453e7
- hash: ac7f226bdf1c6750afa6a03da2b483eee2ef02cd9c2d6af71ea7c6a9a4eace2f
- ip: 216.107.136.46
- url: http://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip
- url: http://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip'
Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
Description
CVE-2025-12480 is a critical vulnerability in Gladinet's Triofox file-sharing platform that allows unauthenticated attackers to access configuration pages and execute arbitrary payloads. Exploited by threat actor UNC6485 since August 2025, the attack chain involves HTTP host header manipulation and abuse of Triofox's built-in anti-virus feature to run malicious scripts. Attackers create admin accounts, deploy remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, and establish encrypted command-and-control tunnels. The vulnerability affects Triofox version 16. 4. 10317. 56372 and was patched in version 16. 7. 10368. 56560.
AI-Powered Analysis
Technical Analysis
CVE-2025-12480 is a critical unauthenticated remote code execution vulnerability in Gladinet's Triofox file-sharing platform, specifically affecting version 16.4.10317.56372. The flaw allows attackers to bypass authentication and gain access to configuration pages by manipulating HTTP host headers. The exploit chain further abuses the platform's built-in anti-virus feature to execute arbitrary malicious scripts, enabling attackers to create administrative accounts and deploy remote access tools such as Zoho UEMS, Zoho Assist, and AnyDesk. The threat actor UNC6485 has been observed exploiting this vulnerability since August 24, 2025, conducting reconnaissance, privilege escalation, and establishing encrypted tunnels for command-and-control communications. This multi-stage attack leverages several MITRE ATT&CK techniques including T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1574.001 (Hijack Execution Flow: DLL Side-Loading), and T1569.002 (System Services: Service Execution). The vulnerability was patched in Triofox version 16.7.10368.56560. Indicators of compromise include specific file hashes and IP addresses linked to the attacker infrastructure. The attack requires no authentication or user interaction, making it highly exploitable and dangerous for organizations relying on Triofox for secure file sharing and collaboration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of sensitive data shared via Triofox. Unauthorized administrative access allows attackers to manipulate configurations, deploy persistent remote access tools, and potentially move laterally within networks. The ability to execute arbitrary code without authentication can lead to data exfiltration, ransomware deployment, or disruption of business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Triofox for file sharing are particularly vulnerable. The exploitation could undermine trust in file-sharing platforms and cause regulatory compliance issues under GDPR due to potential data breaches. The use of encrypted tunnels for command-and-control complicates detection and response, increasing the risk of prolonged undetected intrusions. The medium severity rating may underestimate the real-world impact given the ease of exploitation and the critical nature of the access gained.
Mitigation Recommendations
European organizations should immediately verify their Triofox version and upgrade to version 16.7.10368.56560 or later to patch CVE-2025-12480. Network segmentation should be enforced to limit access to Triofox servers, and strict firewall rules should restrict inbound traffic to trusted sources. Implement robust monitoring for unusual HTTP host header values and suspicious anti-virus feature activity indicative of exploitation attempts. Deploy endpoint detection and response (EDR) solutions to detect the use of remote access tools like Zoho UEMS, Zoho Assist, and AnyDesk, especially if installed without authorization. Conduct regular audits of administrative accounts on Triofox to identify unauthorized creations. Employ multi-factor authentication (MFA) on all administrative interfaces where possible, even if the vulnerability bypasses authentication, to add defense in depth. Incident response plans should include procedures for isolating compromised systems and analyzing encrypted tunnels for command-and-control traffic. Finally, raise user awareness about the risks of unauthorized remote access tools and ensure timely application of security patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480"]
- Adversary
- UNC6485
- Pulse Id
- 691260231a04d225ffb91c93
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-12480 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash269ce7b3a3fcdf735cd8a37c04abfdae | — | |
hash36e31f610eef3223154e6e8fd074190f | — | |
hash803278de3514dbf83a5b6f39c99f4000 | — | |
hash1f2800382cd71163c10e5ce0a32b60297489fbb5 | — | |
hash46ddfbbb5b4193279b9e024a5d013f5d825fcdf5 | — | |
hash481aae12b0abc29fa19f6b7af5d66ef6f811e999 | — | |
hash16cbe40fb24ce2d422afddb5a90a5801ced32ef52c22c2fc77b25a90837f28ad | — | |
hash43c455274d41e58132be7f66139566a941190ceba46082eb2ad7a6a261bfd63f | — | |
hash50479953865b30775056441b10fdcb984126ba4f98af4f64756902a807b453e7 | — | |
hashac7f226bdf1c6750afa6a03da2b483eee2ef02cd9c2d6af71ea7c6a9a4eace2f | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip216.107.136.46 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip | — | |
urlhttp://84.200.80.252/SAgentInstaller_16.7.10368.56560.zip' | — |
Threat ID: 691308308240c40e4c090aa8
Added to database: 11/11/2025, 9:56:00 AM
Last enriched: 11/11/2025, 10:01:09 AM
Last updated: 11/11/2025, 5:27:34 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
OSINT - PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
MediumLazarus Group targets Aerospace and Defense with new Comebacker variant
MediumFrom primitive crypto theft to sophisticated AI-based deception
MediumGotta fly: Targeting the UAV sector
MediumThe Rise of Online Casino Spam
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.