The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14611

CVE-2025-14611: Gladinet CentreStack Path Traversal Flaw

CVE-2025-14611 is a path traversal vulnerability in Gladinet CentreStack that allows unauthenticated attackers to access local files through hardcoded AES values. This article covers technical details, affected versions, and fixes.

Published: March 11, 2026

CVE-2025-14611 Overview

CVE-2025-14611 is a critical hardcoded credentials vulnerability affecting Gladinet CentreStack and Triofox enterprise file sharing solutions prior to version 16.12.10420.56791. The vulnerability stems from the use of hardcoded values in the AES cryptographic implementation, which severely degrades the security posture of publicly exposed endpoints. Attackers can exploit this weakness to achieve arbitrary local file inclusion through specially crafted unauthenticated requests, potentially leading to full system compromise when chained with other vulnerabilities.

Critical Impact

This vulnerability is actively exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog. Organizations running vulnerable versions of Gladinet CentreStack or Triofox should prioritize immediate patching.

Affected Products

  • Gladinet CentreStack versions prior to 16.12.10420.56791
  • Gladinet Triofox versions prior to 16.12.10420.56791

Discovery Timeline

  • 2025-12-12 - CVE-2025-14611 published to NVD
  • 2025-12-16 - Last updated in NVD database

Technical Details for CVE-2025-14611

Vulnerability Analysis

This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), a configuration and design flaw that represents a significant departure from cryptographic best practices. The core issue lies in Gladinet's implementation of AES encryption within CentreStack and Triofox, where static, hardcoded key values are used instead of dynamically generated or securely stored cryptographic keys.

When cryptographic keys are hardcoded into application code, they become discoverable through reverse engineering, static analysis, or examination of deployed binaries. Once an attacker recovers these keys, they can decrypt protected communications, forge authenticated requests, and bypass security controls that depend on the cryptographic integrity of the system.

The network-accessible nature of this vulnerability is particularly concerning for enterprise deployments where CentreStack and Triofox instances are exposed to the internet for remote file access functionality. The attack requires high complexity to execute but requires no authentication or user interaction, making it suitable for automated exploitation campaigns.

Root Cause

The root cause of CVE-2025-14611 is the implementation decision to use static, hardcoded values for AES encryption rather than employing proper key management practices. Secure cryptographic implementations require unique keys that are:

  1. Generated using cryptographically secure random number generators
  2. Stored securely outside of application code (e.g., hardware security modules, secure key vaults)
  3. Rotated periodically according to organizational security policies
  4. Unique per installation or deployment

By embedding encryption keys directly in the application code, Gladinet created a scenario where every installation of the affected versions shares identical cryptographic material, effectively nullifying the security benefits of encryption for any attacker who obtains the hardcoded keys.

Attack Vector

The vulnerability is exploitable over the network against publicly exposed CentreStack and Triofox endpoints. Attackers can leverage knowledge of the hardcoded AES keys to craft malicious requests that bypass cryptographic protections. The exploitation flow involves:

The attacker first recovers the hardcoded AES key values from the vulnerable application through reverse engineering or from publicly available exploit information. Using these keys, the attacker can then craft specially formed requests that the application will accept as legitimate cryptographically protected communications. The malformed requests can be used to trigger arbitrary local file inclusion, allowing the attacker to read sensitive files from the server filesystem without authentication.

According to Huntress research, this vulnerability can be combined with previous vulnerabilities in the product to achieve full system compromise, escalating from information disclosure to complete control of the affected server.

Detection Methods for CVE-2025-14611

Indicators of Compromise

  • Unusual file access patterns on CentreStack or Triofox servers, particularly requests for sensitive configuration files or system files
  • Anomalous authentication-bypass attempts in web server logs targeting Gladinet endpoints
  • Unexpected outbound connections from Gladinet servers that may indicate post-exploitation activity
  • Evidence of file read operations outside of normal user directories or shares

Detection Strategies

  • Monitor web application firewall (WAF) logs for malformed or suspicious requests targeting Gladinet CentreStack and Triofox endpoints
  • Implement file integrity monitoring on Gladinet server installations to detect unauthorized configuration changes or exploitation artifacts
  • Deploy network intrusion detection signatures for known CVE-2025-14611 exploitation patterns
  • Review server access logs for unauthenticated requests to sensitive API endpoints

Monitoring Recommendations

  • Enable verbose logging on all Gladinet CentreStack and Triofox instances to capture detailed request information
  • Configure alerts for local file inclusion patterns such as directory traversal sequences (../) in request parameters
  • Monitor for reconnaissance activity targeting Gladinet infrastructure, including version fingerprinting attempts
  • Establish baseline network behavior for Gladinet servers and alert on deviations

How to Mitigate CVE-2025-14611

Immediate Actions Required

  • Upgrade all Gladinet CentreStack and Triofox installations to version 16.12.10420.56791 or later immediately
  • Audit network exposure of Gladinet servers and restrict access where possible using firewall rules or VPN requirements
  • Review server logs for any evidence of prior exploitation attempts
  • Rotate any credentials or secrets that may have been exposed through file inclusion attacks

Patch Information

Gladinet has addressed this vulnerability in version 16.12.10420.56791 of both CentreStack and Triofox. Organizations should upgrade to this version or later as the primary remediation measure. Given that this vulnerability is listed in the CISA Known Exploited Vulnerabilities Catalog, federal agencies are required to remediate within mandated timeframes, and all organizations are strongly encouraged to treat this as a critical priority.

Workarounds

  • If immediate patching is not possible, restrict network access to Gladinet servers to trusted IP ranges only using firewall rules
  • Place affected Gladinet instances behind a VPN to eliminate direct internet exposure
  • Implement a web application firewall (WAF) with rules to detect and block local file inclusion attempts
  • Consider temporarily disabling public-facing Gladinet services until patching can be completed
bash
# Example: Restrict access to Gladinet server using iptables
# Allow access only from trusted corporate network
iptables -A INPUT -p tcp --dport 443 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

# Verify Gladinet version after patching
# Check the installed version in the Gladinet management console
# Ensure version is 16.12.10420.56791 or higher

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechGladinet Centrestack

  • SeverityHIGH

  • CVSS Score7.1

  • EPSS Probability59.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-798
  • Technical References
  • Huntress Blog Post on Vulnerabilities

  • CISA Known Exploited Vulnerabilities Catalog
  • Related CVEs
  • CVE-2025-30406: Gladinet CentreStack RCE Vulnerability

  • CVE-2025-11371: Gladinet CentreStack LFI Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English