The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability in Gladinet CentreStack, a cloud-based enterprise file-sharing platform.
The issue, tracked as CVE-2025-30406, involves the use of a hard-coded cryptographic key that could enable attackers to execute remote code on compromised systems, posing a major security risk to organizations relying on CentreStack for file-sharing operations.
Details of CVE-2025-30406
Gladinet CentreStack contains a vulnerability where hard-coded cryptographic keys are used for managing ViewState integrity verification.
ViewState is a method commonly used in ASP.NET applications to persist the state of a web page or control between server requests.
In this case, the hard-coded key flaw allows attackers to forge ViewState payloads for server-side deserialization.
Successful exploitation of this issue enables remote code execution, effectively granting attackers unauthorized access to the underlying system.
The vulnerability is classified under the CWE-321 (Use of Hard-coded Cryptographic Key) category, highlighting the flawed design of embedding fixed cryptographic keys in the application’s code.
As of now, it is unknown if this vulnerability is being actively utilized in ransomware campaigns, but the remote code execution risk makes it a potential target for cybercriminals.
CISA’s alert comes amidst growing concerns over vulnerabilities in cloud services that underpin critical business operations.
Enterprises using Gladinet CentreStack for secure file sharing or collaboration are urged to assess their exposure to this vulnerability immediately.
CISA especially recommends following Binding Operational Directive (BOD) 22-01, which guides securing cloud services.
Organizations leveraging CentreStack are advised to follow the mitigations suggested by the software vendor or consider discontinuing the use of the product if mitigations are unavailable. CISA’s key recommendations include:
- Apply Vendor-Provided Patches or Updates: Gladinet has likely provided critical updates or instructions to address CVE-2025-30406. Administrators should ensure they implement these fixes without delay.
- Follow BOD 22-01 Guidelines: Ensure that your cloud services comply with CISA’s recommendations for enhanced security. This directive focuses on reducing exposure to threats targeting cloud infrastructure.
- Evaluate Temporary Measures: If no immediate patch is available, consider disabling CentreStack services until mitigation strategies are confirmed.
- Monitor for Unusual Activity: Check for signs of attempted exploitation, such as unauthorized access patterns or tampering with critical data.
This alert underscores the urgency of addressing vulnerabilities in third-party applications that power essential business functions.
Organizations are encouraged to adopt proactive security measures and keep communication channels open with their IT teams and vendors.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!