NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

Update these two servers from Gladinet immediately, CISOs told

Update these two servers from Gladinet immediately, CISOs told
Share on FacebookShare on Twitter

Rewrite the

CISOs running Gladinet’s CentreStack file server or Triofox file sharing server should update the applications as soon as possible because of a hard-coded key vulnerability which is being exploited now, say researchers at Huntress.

“Immediate action is essential.” John Hammond, principal security researcher at Huntress, said in an email to CSO.

“If left unpatched, it opens the door to data breaches and system compromise with minimal effort.”

The vulnerability, CVE-2025-30406, is so bad that it was added to the US Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities Catalog on April 8. Since then, Huntress has seen seven organizations compromised through this hole.

According to MITRE, the vulnerability has been exploited since March.

CVE-2025-30406 ranks as a critical severity vulnerability, Hammond added. “Simply, the server being accessible is the only requirement for it to be exploited. Vulnerable Gladinet CentreStack or Triofox instances are susceptible to this via their own sensitive cryptographic keys, which are hardcoded in the application and unchanged by default. These keys are trivial to obtain, and once an adversary knows what the values are, it is ‘point and shoot’ open season for exposed servers.”

“There are a few hundred vulnerable servers exposed to the public internet, according to Shodan,” Hammond wrote in a blog earlier this week. “While this may be a relatively small number, the risk of immediate compromise is still severe.” 

The bulk of those servers are in the US and Canada.

Vulnerable are Gladinet CentreStack versions up to 16.1.10296.56315; the hole has been fixed in version 16.4.10315.56368. All versions of Triofox below 16.4.10317.56372 are vulnerable. And, said the blog, “If a Gladinet CentreStack or Triofox server is exposed to the internet with these hardcoded keys, it is in immediate danger and needs to be patched or have the machineKey values changed as soon as possible.”

According to Hammond, the CentreStack web portal is an ASPX application and uses the typical web.config file in this installation path: C:Program Files (x86)Gladinet Cloud Enterpriserootweb.config, although it has also been seen in this path as well: C:Program Files (x86)Gladinet Cloud Enterpriseportalweb.config.

Similarly, Triofox web.config files could be in two locations: C:Program Files (x86)Triofoxrootweb.config and C:Program Files (x86)Triofoxportalweb.config.

The weakness can be leveraged to abuse the ASPX ViewState, a mechanism used to preserve the state of a web page and its controls between multiple HTTP requests, says the Huntress blog. The hardcoded keys open the door for a very standard and well-researched attack technique with ViewState deserialization.

“To be clear,” the blog added, “there may be two web.config files (one in root and one in portal directories) as this is a very common setup in ASP.NET applications. There is a root web app, and nested sub-applications.”

To patch or mitigate the risk, says Huntress, “if both web.config files are present, both must have updated machineKey values, or the portalweb.config machineKey can be removed. The official Gladinet updates the rootweb.config file but removes the machineKey entry from portalweb.config. “This is a very important nuance because all configuration files must make sure they do not use the default hardcoded key value in order to be fully protected,” said the blog.

Gladinet’s security advisories for CentreStack and Triofox provide further remediation guidance.

Hard to defend against attacks

Roger Grimes, data driven defense analyst at KnowBe4, said in an email that hard-coded credential vulnerabilities are hard to build a defense around unless the vendor can release a fix, although, he added, an IT admin can might be able to remove the device from their network until it is fixed, or block remote access to the impacted device until it is remediated.

“What frustrates me is that hard-coded credentials are probably the easiest type of code vulnerability that anyone could think of. It’s very basic and easy to see that it’s wrong and an accident just waiting to happen. Yet I’ve seen a few of them announced in the last week or two.

Programmers not properly trained

How can programmers make this type of basic mistake?

For starters, Grimes said, they aren’t trained not to do it. “Almost no programming curriculum in the world (for example, university, technical school, online, etc.) teaches secure programming,” he said. “And if we don’t teach our programmers about common vulnerabilities and how to avoid them, how can we magically expect them not to put them in their code? If you look at how we taught our programmers, you would expect to see the result we are getting today… which is over 40,200 separate vulnerabilities a year and growing. And the source reason of why we don’t teach programmers to code more securely is that almost no employer asks their programmers to have secure programming skills to get hired. If employers aren’t requiring it, schools aren’t going to teach it.”

“If you don’t like the sheer number of hard-coded credentials still happening today, just relax,” he added. “There are, for sure, 1,000 programmers also putting hard-coded credentials into their apps every day and we will only find out about a very small percentage of them over time. The rest will live without being discovered, or it will be discovered that the attacker using them isn’t announcing it to the world anytime soon.”

in well organized HTML format with all tags properly closed. Create appropriate headings and subheadings to organize the content. Ensure the rewritten content is approximately 1500 words. Do not include the title and images. please do not add any introductory text in start and any Note in the end explaining about what you have done or how you done it .i am directly publishing the output as article so please only give me rewritten content. At the end of the content, include a “Conclusion” section and a well-formatted “FAQs” section.

cryptoendevr

cryptoendevr

Related Stories

“Ransomware, was ist das?”

“Ransomware, was ist das?”

July 10, 2025
0

Rewrite the width="5175" height="2910" sizes="(max-width: 5175px) 100vw, 5175px">Gefahr nicht erkannt, Gefahr nicht gebannt.Leremy – shutterstock.com KI-Anbieter Cohesity hat 1.000 Mitarbeitende...

BTR: AI, Compliance, and the Future of Mainframe Modernization

BTR: AI, Compliance, and the Future of Mainframe Modernization

July 10, 2025
0

Rewrite the As artificial intelligence (AI) reshapes the enterprise technology landscape, industry leaders are rethinking modernization strategies to balance agility,...

Warning to ServiceNow admins: Fix your access control lists now

Warning to ServiceNow admins: Fix your access control lists now

July 9, 2025
0

Rewrite the “This vulnerability was relatively simple to exploit, and required only minimal table access, such as a weak user...

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

July 9, 2025
0

Rewrite the Palantir Technologies Inc., a leading provider of enterprise operating systems, and Tomorrow.io, a leading weather intelligence and resilience...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

December 3, 2025
ETH briefly touches K but traders remain skeptical: Here’s why

ETH briefly touches $3K but traders remain skeptical: Here’s why

December 3, 2025
Ether Treasury Stocks Lead Crypto Recovery Gains

Ether Treasury Stocks Lead Crypto Recovery Gains

December 3, 2025
Haven – Blockchain With Biometric Authentication

Haven – Blockchain With Biometric Authentication

December 3, 2025
Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

December 2, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr