Friday, April 25, 2025
HomeCVE/vulnerabilityCISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability in Gladinet CentreStack, a cloud-based enterprise file-sharing platform.

The issue, tracked as CVE-2025-30406, involves the use of a hard-coded cryptographic key that could enable attackers to execute remote code on compromised systems, posing a major security risk to organizations relying on CentreStack for file-sharing operations.

Details of CVE-2025-30406

Gladinet CentreStack contains a vulnerability where hard-coded cryptographic keys are used for managing ViewState integrity verification.

- Advertisement - Google News

ViewState is a method commonly used in ASP.NET applications to persist the state of a web page or control between server requests.

In this case, the hard-coded key flaw allows attackers to forge ViewState payloads for server-side deserialization.

Successful exploitation of this issue enables remote code execution, effectively granting attackers unauthorized access to the underlying system.

The vulnerability is classified under the CWE-321 (Use of Hard-coded Cryptographic Key) category, highlighting the flawed design of embedding fixed cryptographic keys in the application’s code.

As of now, it is unknown if this vulnerability is being actively utilized in ransomware campaigns, but the remote code execution risk makes it a potential target for cybercriminals.

CISA’s alert comes amidst growing concerns over vulnerabilities in cloud services that underpin critical business operations.

Enterprises using Gladinet CentreStack for secure file sharing or collaboration are urged to assess their exposure to this vulnerability immediately.

CISA especially recommends following Binding Operational Directive (BOD) 22-01, which guides securing cloud services.

Organizations leveraging CentreStack are advised to follow the mitigations suggested by the software vendor or consider discontinuing the use of the product if mitigations are unavailable. CISA’s key recommendations include:

  1. Apply Vendor-Provided Patches or Updates: Gladinet has likely provided critical updates or instructions to address CVE-2025-30406. Administrators should ensure they implement these fixes without delay.
  2. Follow BOD 22-01 Guidelines: Ensure that your cloud services comply with CISA’s recommendations for enhanced security. This directive focuses on reducing exposure to threats targeting cloud infrastructure.
  3. Evaluate Temporary Measures: If no immediate patch is available, consider disabling CentreStack services until mitigation strategies are confirmed.
  4. Monitor for Unusual Activity: Check for signs of attempted exploitation, such as unauthorized access patterns or tampering with critical data.

This alert underscores the urgency of addressing vulnerabilities in third-party applications that power essential business functions.

Organizations are encouraged to adopt proactive security measures and keep communication channels open with their IT teams and vendors.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers

With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...