CVE-2025-12480
Gladinet Triofox vulnerability analysis and mitigation

Overview

CVE-2025-12480 is a critical authentication bypass vulnerability (CVSS score: 9.1) affecting Gladinet's Triofox file-sharing and remote access platform versions prior to 16.7.10368.56560. The vulnerability was discovered in August 2025 and allows unauthenticated attackers to bypass authentication and access the application's configuration pages. The flaw was actively exploited by a threat actor tracked as UNC6485 starting from August 24, 2025, nearly a month after Gladinet released patches (Hacker News, Google Cloud).

Technical details

The vulnerability stems from an improper access control implementation in the Triofox web interface. The flaw allows attackers to bypass authentication by conducting an HTTP Host header attack, where setting the Host value to 'localhost' grants access to the AdminDatabase.aspx configuration page. The root cause was identified in the CanRunCriticalPage() function within the GladPageUILib.GladBasePage class, which failed to properly validate request origins and relied solely on the Request.Url.Host value (Google Cloud).

Impact

The vulnerability enables attackers to gain unauthorized administrative access to Triofox instances, create new administrative accounts, and achieve SYSTEM-level code execution through the platform's built-in antivirus feature. This allows attackers to deploy remote access tools, conduct reconnaissance of internal networks, and potentially escalate privileges to domain administrator level (Help Net Security, Google Cloud).

Mitigation and workarounds

Organizations are strongly advised to upgrade to Triofox version 16.7.10368.56560 or later, which patches the vulnerability. Additional recommended mitigations include auditing administrative accounts, verifying that Triofox's antivirus engine is not configured to execute unauthorized scripts or binaries, and monitoring for anomalous outbound SSH traffic (Google Cloud, Help Net Security).

Additional resources


SourceThis report was generated using AI

Related Gladinet Triofox vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-30406CRITICAL9.8
  • Gladinet CentreStackGladinet CentreStack
  • cpe:2.3:a:gladinet:centrestack
YesYesApr 03, 2025
CVE-2025-12480CRITICAL9.1
  • Gladinet TriofoxGladinet Triofox
    YesYesNov 10, 2025

    Free Vulnerability Assessment

    Benchmark your Cloud Security Posture

    Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

    Request assessment

    Get a personalized demo

    Ready to see Wiz in action?

    "Best User Experience I have ever seen, provides full visibility to cloud workloads."
    David EstlickCISO
    "Wiz provides a single pane of glass to see what is going on in our cloud environments."
    Adam FletcherChief Security Officer
    "We know that if Wiz identifies something as critical, it actually is."
    Greg PoniatowskiHead of Threat and Vulnerability Management