9
CVSSv3

CVE-2025-30406

CVSSv4: NA | CVSSv3: 9 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.58507 | KEV: Exploitation Reported
Published: 03/04/2025 Updated: 04/04/2025

Vulnerability Summary

Gladinet CentreStack Remote Code Execution via Deserialization Vulnerability

Gladinet CentreStack, up to version 16.1.10296.56315, has a serious deserialization vulnerability in its portal. The issue stems from a hardcoded machineKey that allows threat actors to create a specialized payload for server-side deserialization. If an attacker knows the machineKey, they can potentially execute remote code. This vulnerability was actively exploited in the wild during March 2025. The problem was fixed in version 16.4.10315.56368. A CentreStack administrator can manually mitigate the risk by deleting the machineKey located in the portal\web.config file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gladinet centrestack

Github Repositories

Use of Hard-coded Cryptographic Key (CWE-321)

CVE-2025-30406 Overview A deserialization vulnerability in Gladinet CentreStack portal exists due to a hardcoded machineKey This vulnerability allows to create a serialized payload that can be deserialized on the server, leading to remote code execution Details CVE ID: CVE-2025-30406 Published: 2025-04-03 Impact: Critical Exploit Availability: Not public, only private Affe

Recent Articles

CentreStack RCE exploited as zero-day to breach file sharing servers
BleepingComputer • Bill Toulas • 09 Apr 2025

CentreStack RCE exploited as zero-day to breach file sharing servers By Bill Toulas April 9, 2025 11:38 AM 0 Hackers exploited a vulnerability in Gladinet CentreStack's secure file-sharing software as a zero-day since March to breach storage servers Gladinet CentreStack is an enterprise file-sharing and access platform that turns on-premise file servers (like Windows servers with SMB shares) into secure, cloud-like file systems supporting remote access to internal file shares, file syncing and s...