Critical Triofox bug exploited to run malicious payloads via AV configuration
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是黑客利用Triofox的一个漏洞CVE-2025-12480,通过平台的杀毒功能上传恶意脚本,绕过认证并安装远程访问工具。Mandiant的研究人员发现了这个攻击,涉及威胁组织UNC6485。攻击者创建了一个新的管理员账户“Cluster Admin”,然后通过杀毒功能路径指向他们的脚本,以SYSTEM权限执行恶意代码。 接下来,他们上传文件到共享目录触发脚本,下载并执行伪装的payload,安装Zoho UEMS来部署远程访问工具如Zoho Assist和AnyDesk。他们还进行了权限提升和横向移动,并建立了SSH隧道进行C2通信。 最后,文章建议升级到最新版本的Triofox,并审计管理员账户和杀毒引擎配置。 现在我需要把这些信息浓缩到100字以内。重点包括漏洞名称、攻击方式、利用杀毒功能上传恶意脚本、绕过认证、创建管理员账户、执行恶意代码以及建议措施。 可能的结构:黑客利用Triofox漏洞CVE-2025-12480,通过杀毒功能上传恶意脚本,绕过认证创建管理员账户并执行恶意代码。Mandiant建议升级系统并检查配置。 检查字数是否在限制内,并确保涵盖关键点:漏洞、攻击方式、影响和建议。 </think> 黑客利用Triofox漏洞CVE-2025-12480通过其杀毒功能上传恶意脚本,绕过认证创建管理员账户并执行恶意代码。Mandiant建议升级系统并检查配置以防止类似攻击。 2025-11-11 07:28:5 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

Critical Triofox bug exploited to run malicious payloads via AV configuration

Pierluigi Paganini November 11, 2025

Hackers exploited Triofox flaw CVE-2025-12480 to bypass auth and install remote access tools via the platform’s antivirus feature.

Google’s Mandiant researchers spotted threat actors exploiting a now-patched Triofox flaw, tracked as CVE-2025-12480 (CVSS score of 9.1) that allows them to bypass authentication to upload and run remote access tools via the platform’s antivirus feature.

Mandiant has been tracking the ongoing exploitation of the Triofox flaw CVE-2025-12480 to threat cluster UNC6485.

“As early as Aug. 24, 2025, a threat cluster tracked by Google Threat Intelligence Group (GTIG) as UNC6485 exploited the unauthenticated access vulnerability and chained it with the abuse of the built-in anti-virus feature to achieve code execution.” reads the report published by Mandiant.

Mandiant leveraged Google Security Operations to detect suspicious activity on a customer’s Triofox server involving PLINK-based RDP tunneling and file downloads to temp directories.

It’s the third Triofox bug abused this year, following CVE-2025-30406 and CVE-2025-11371. The update blocks access to configuration pages after setup, but attackers exploited unauthenticated access to create a new admin account, “Cluster Admin,” through the setup process, using it for further malicious activity across compromised systems.

Mandiant found a suspicious HTTP request showing an external source using a “localhost” host header, a circumstance suggesting an exploit. Testing showed that Triofox pages like AdminAccount.aspx and AdminDatabase.aspx should redirect to “Access Denied,” but changing the Host header to “localhost” bypassed these controls, granting access to the admin setup process and enabling creation of new admin accounts. Analysis revealed the vulnerable CanRunCriticalPage() function in GladPageUILib.dll, which grants access if the Host equals “localhost.” The flaw lets attackers fake the Host header to bypass checks, has no way to verify where requests really come from, and only relies on easily misconfigured settings for protection.

The attacker used the newly created admin account to upload and run a malicious batch via Triofox’s antivirus feature by pointing the AV path to their script, which executed with SYSTEM privileges. Uploading any file to a published share triggered the script. The batch ran a PowerShell downloader that fetched a disguised payload from http://84.200.80[.]252 (saved as C:\Windows\appcompat\SAgentInstaller_16.7.10368.56560.exe) and launched it silently. The payload installed Zoho UEMS, which the attacker abused to deploy Zoho Assist and AnyDesk for remote access. Attackers enumerated SMB sessions and user accounts using Zoho Assist, then tried password changes and privilege escalation (adding accounts to local admins and Domain Admins). For persistence and C2 tunneling they downloaded plink-like tools (sihosts.exe, silcon.exe) into C:\Windows\Temp and established an SSH reverse tunnel over port 433 to 216.107.136[.]46, forwarding remote RDP (127.0.0.1:3389) to the attacker-controlled host.

“While this vulnerability is patched in the Triofox version 16.7.10368.56560, Mandiant recommends upgrading to the latest release. In addition, Mandiant recommends auditing admin accounts, and verifying that Triofox’s Anti-virus Engine is not configured to execute unauthorized scripts or binaries.” concludes the report. “Security teams should also hunt for attacker tools using our hunting queries listed at the bottom of this post, and monitor for anomalous outbound SSH traffic.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Triofox)




文章来源: https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html
如有侵权请联系:admin#unsafe.sh