meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Triofox and the key to disaster. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 31 May 2025

⏱️ 20 minutes

🧾️ Download transcript

Summary

This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations. The research can be found here: ⁠CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.7

And now a word from our sponsor, SpyCloud. Identity is the new battleground, and attackers are

0:17.9

exploiting stolen identities to infiltrate your organization.

0:21.6

Traditional defenses can't keep up.

0:23.9

SpyCloud's holistic identity threat protection helps security teams uncover and automatically

0:29.3

remediate hidden exposures across your users, from breaches, malware and fishing to neutralize

0:35.6

identity-based threats like account takeover, fraud, and ransomware.

0:40.0

Don't let invisible threats compromise your business.

0:43.0

Get your free corporate darknet exposure report at spycloud.com slash cyberwire and see what

0:49.9

attackers already know. That's spycloud.com slash cyberwire.

0:55.4

Hello everyone and welcome to the CyberWires Research Saturday.

1:11.4

I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking

1:16.6

down the threats and vulnerabilities, solving some of the hard problems and protecting

1:21.1

ourselves in a rapidly evolving cyberspace.

1:24.8

Thanks for joining us.

1:35.8

If we see that in a strange or new or different application or program that we don't typically see, we start to get the hunch. Hey, there might be some weaknesses. There's a flaw

1:41.0

or potential vulnerability in that software. And truth be told, that was

1:45.1

the very beginning of the story here. When we saw this detector fire, well, that pointed us

1:50.4

towards that center stack application. And then after we did our homework, did a little bit of research,

1:55.1

we see, oh, this has just recently been added to the known exploited vulnerabilities database that SISA maintains.

2:02.9

And we're thinking, okay, yeah, we're on to something here.

2:06.2

That's John Hammond, principal security researcher at Huntress.

...

Transcript will be available on the free plan in 13 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.