Gladinet fixes actively exploited zero-day in file-sharing software https://lnkd.in/gnWBtDHW Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September. The local file inclusion (LFI) vulnerability enabled attackers to read the Web.config file on fully patched CentreStack deployments, extract the machine key, and then use it to exploit CVE-2025-30406. When Huntress alerted of the zero-day attacks Gladinet provided mitigations for customers and was in the process of developing a patch. The security update that addresses CVE-2025-11371 is now available in CentreStack version 16.10.10408.56683 and administrators are strongly recommended to install it.
Gladinet fixes zero-day vulnerability in CentreStack
More Relevant Posts
-
#cyberNEWS Gladinet fixes actively exploited zero-day in file-sharing software. Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September. Researchers at cybersecurity platform Huntress disclosed the exploitation activity last week saying that the flaw was a bypass for mitigations Gladinet implemented for the deserialization vulnerability leading to remote code execution (RCE) identified as CVE-2025-30406. https://lnkd.in/d3zHN7d8
To view or add a comment, sign in
-
Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September.
To view or add a comment, sign in
-
Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September. https://lnkd.in/d3zHN7d8
To view or add a comment, sign in
-
The latest update for #Detectify includes "The #API vulnerabilities nobody talks about: excessive data exposure" and "New API #testing category now available". #cybersecurity #webvulnerabilities #websecurity https://lnkd.in/dHMDMPz
To view or add a comment, sign in
-
Gladinet has released security updates for its CentreStack business solution to address a local file inclusion vulnerability (CVE-2025-11371) that threat actors have leveraged as a zero-day since late September. Researchers at cybersecurity platform Huntress disclosed the exploitation activity last week saying that the flaw was a bypass for mitigations Gladinet implemented for the deserialization vulnerability leading to remote code execution (RCE) identified as CVE-2025-30406. #staycurious #stayinformed #noble1 #tomshaw TOM SHAW
To view or add a comment, sign in
-
Security researchers have discovered a malicious modification in the npm package postmark-mcp, an MCP server used to send emails through Postmark. By adding a blind copy to an external domain, attackers were able to secretly exfiltrate email contents. This marks the first known instance of an MCP server being exploited in the wild. Learn more about the vulnerability, indicators of compromise and mitigation details in this blog by Diksha Ojha. #ThreatProtection #VulnerabilityManagement
To view or add a comment, sign in
-
Security researchers have discovered a malicious modification in the npm package postmark-mcp, an MCP server used to send emails through Postmark. By adding a blind copy to an external domain, attackers were able to secretly exfiltrate email contents. This marks the first known instance of an MCP server being exploited in the wild. Learn more about the vulnerability, indicators of compromise and mitigation details in this blog by Diksha Ojha. #ThreatProtection #VulnerabilityManagement
To view or add a comment, sign in
-
Security researchers have discovered a malicious modification in the npm package postmark-mcp, an MCP server used to send emails through Postmark. By adding a blind copy to an external domain, attackers were able to secretly exfiltrate email contents. This marks the first known instance of an MCP server being exploited in the wild. Learn more about the vulnerability, indicators of compromise and mitigation details in this blog by Diksha Ojha. #ThreatProtection #VulnerabilityManagement
To view or add a comment, sign in
-
Security researchers have discovered a malicious modification in the npm package postmark-mcp, an MCP server used to send emails through Postmark. By adding a blind copy to an external domain, attackers were able to secretly exfiltrate email contents. This marks the first known instance of an MCP server being exploited in the wild. Learn more about the vulnerability, indicators of compromise and mitigation details in this blog by Diksha Ojha. #ThreatProtection #VulnerabilityManagement
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development