Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config.
https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
https://www.darkreading.com/vulnerabilities-threats/zero-day-centrestack-platform-under-attack
https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/
https://thehackernews.com/2025/04/cisa-warns-of-centrestacks-hard-coded.html
Published: 2025-04-03
Updated: 2025-04-22
Named Vulnerability: Gladinet CentreStack flawKnown Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.70426