CVE-2025-30406
Known Exploited Vulnerability Entry External Catalog
Entry Details
Confirmed
Yes
2025-04-08 00:00 UTC
Timestamps
2025-04-08
2025-04-08
Scope
KEV entry: Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability | Affected: Gladinet / CentreStack | Description: Gladinet CentreStack and Triofox contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-04-29 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf ; https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2025-triofox.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2025-30406
References
- {'id': 'CVE-2025-30406', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-30406'}
54d49b3a-c3cb-4606-b0a3-bb5dd783beae
405284c2-e461-4670-8979-7fd2c9755a60
2026-02-02 13:24 UTC
2026-02-06 07:53 UTC
Evidence (1)
| Type | Source | Signal | Confidence | Details | GCVE Metadata |
|---|---|---|---|---|---|
| vendor_report | cisa-kev | successful_exploitation | 0.80 |
View details
|
- |