Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是Gladinet的CentreStack和Triofox产品中存在一个未记录的漏洞。黑客利用这个漏洞获取了硬编码的加密密钥,进而实现远程代码执行。这个漏洞还没有官方编号,但Gladinet已经通知客户升级到最新版本,并提供了 IoCs。 Huntress的研究人员发现了至少九个被攻击的组织,攻击者还利用了另一个旧漏洞CVE-2025-30406。问题出在AES算法的自定义实现上,密钥和IV被硬编码在DLL文件中,容易被提取。攻击者可以伪造访问票证,甚至触发远程代码执行。 总结的时候要包括:产品名称、漏洞影响、攻击手段、修复建议以及受影响组织的数量。同时要简洁明了,不超过100字。 可能的结构是:Gladinet产品存在漏洞→黑客获取密钥→远程执行代码→建议升级和更换密钥→至少九个组织受影响。 现在把这些信息浓缩成一句话,确保涵盖所有关键点。 </think> Gladinet CentreStack 和 Triofox 存在未记录的加密漏洞,允许黑客获取硬编码密钥并执行远程代码。该漏洞已被用于针对至少九个组织的攻击。建议用户升级至最新版本并更换密钥以缓解风险。 2025-12-11 22:0:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks

Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in Gladinet's CentreStack and Triofox products for secure remote file access and sharing.

By leveraging the security issue, the attackers can obtain hardcoded cryptographic keys and achieve remote code execution, researchers warn.

Although the new cryptographic vulnerability does not have an official identifier, Gladinet notified customers about it and advised them to update the products to the latest version, which, at the time of the communication, had been released on November 29.

The company also provided customers with a set of indicators of compromise (IoCs), indicating that the issue was being exploited in the wild.

Security researchers at managed cybersecurity platform Huntress are aware of at least nine organizations targeted in attacks leveraging the new vulnerability along with an older one tracked as CVE-2025-30406 - a local file inclusion flaw that allows a local attacker to access system files without authentication.

Hardcoded cryptographic keys

Using the IoCs from Gladinet, Huntress researchers were able to determine where the flaw was and how threat actors are leveraging it.

Huntress found that the issue stems from the custom implementation of the AES cryptographic algorithm in Gladinet CentreStack and Triofox, where the encryption key and Initialization Vector (IV) were hardcoded inside the GladCtrl64.dll file and could be easily obtained.

Specifically, the key values were derived from two static 100-byte strings of Chinese and Japanese text, which were identical across all product installations.

The flaw lies in the processing of the ‘filesvr.dn’ handler, which decrypts the ‘t’ parameter (Access Ticket) using those static keys, Huntress explains.

Anyone extracting those keys could decrypt the Access Tickets containing file paths, usernames, passwords, and timestamps, or create their own to impersonate users and instruct servers to return any file on the disk.

“Because these keys never change, we could extract them from memory once and use them to decrypt any ticket generated by the server or worse, encrypt our own,” the researchers say.

Huntress observed that Access Tickets were forged using hardcoded AES keys and setting the timestamp to year 9999, so the ticket never expires.

The attackers next requested the server’s web.config file. Since it contains the machineKey, they were able to use it to trigger remote code execution through a ViewState deserialization flaw.

Exploitation activity
Exploitation activity
Source: Huntress

Besides an attacking IP address, 147.124.216[.]205, no specific attribution has been made for those attacks.

Regarding the targets, Huntress confirmed nine organizations as of December 10, from various sectors, including healthcare and technology.

Users of Gladinet CentreStack and Triofox are recommended to upgrade to version 16.12.10420.56791 (released on December 8) as soon as possible and also rotate the machine keys.

Additionally, it is recommended to scan logs for the ‘vghpI7EToZUDIZDdprSubL3mTZ2’ string, which is associated with the encrypted file path, and is considered the only reliable indicator of compromise.

Huntress provides mitigation guidance in its report, along with indicators of compromise that defenders can use to protect their environments or determine if they were breached.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-exploit-gladinet-centrestack-cryptographic-flaw-in-rce-attacks/
如有侵权请联系:admin#unsafe.sh