
CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Learn how to make every AI investment count.
Successful AI transformation starts with deeply understanding your organization’s most critical use cases. We recommend this practical guide from You.com that walks through a proven framework to identify, prioritize, and document high-value AI opportunities.
In this AI Use Case Discovery Guide, you’ll learn how to:
Map internal workflows and customer journeys to pinpoint where AI can drive measurable ROI
Ask the right questions when it comes to AI use cases
Align cross-functional teams and stakeholders for a unified, scalable approach
Active Exploitation Targets Gladinet CentreStack Cryptographic Flaw

Huntress has identified an active wave of attacks targeting Gladinet CentreStack instances, enabling attackers to extract cryptographic keys and ultimately achieve remote code execution. The campaign exploits a cryptographic design flaw that allows adversaries to retrieve sensitive configuration data and abuse ASP.NET ViewState deserialization. Multiple organizations across critical sectors have already been impacted, prompting urgent mitigation guidance.
Context
Gladinet CentreStack is a mobile access and secure file-sharing platform widely used by enterprises to provide cloud-like file access on private infrastructure. Due to its role in handling authentication, session management, and encrypted communications, weaknesses in its cryptographic implementation pose a high risk. Previous CentreStack vulnerabilities exploited this year demonstrate that the platform has been under sustained adversarial interest.
What Happened
According to Huntress, attackers are exploiting a newly identified insecure cryptography flaw in CentreStack to access the application’s web.config file. This file contains a machineKey, a critical cryptographic secret used by ASP.NET applications to protect authentication tickets and ViewState data.
Huntress observed attackers crafting malicious requests that the application inherently trusts, allowing repeated retrieval of sensitive configuration data. In at least nine confirmed cases, organizations across healthcare, technology, and other sectors were compromised. The attackers also created non-expiring tickets, enabling persistent access without repeated exploitation.
Technical Breakdown
CentreStack relies on two static 100-byte strings to derive cryptographic keys. Because these values never change, attackers who obtain them once can reuse them indefinitely.
With access to the machineKey, adversaries can:
Decrypt or forge authentication tickets
Encrypt malicious payloads trusted by the server
Abuse ASP.NET ViewState deserialization to execute arbitrary code
This technique mirrors exploitation patterns seen earlier this year in CVE-2025-30406 and CVE-2025-11371, where ViewState manipulation enabled remote code execution. In this case, the lack of cryptographic key rotation significantly lowers the barrier to exploitation.
Impact Analysis
Successful exploitation grants attackers full control over the affected CentreStack instance. This includes persistent access, arbitrary command execution, and potential lateral movement within connected environments.
Given CentreStack’s role in file access and identity workflows, compromise can expose sensitive data, credentials, and downstream systems. The ability to reuse a single malicious URL indefinitely further increases operational risk.
Why It Matters
This incident highlights a recurring class of failures: static cryptographic material embedded in production systems. Even without a published CVE, real-world exploitation demonstrates that design-level cryptography flaws can be as dangerous as traditional memory corruption bugs.
For defenders, this reinforces the importance of rapid patching, key rotation, and monitoring for anomalous configuration access.
Expert Commentary
Huntress emphasized that the unchanging nature of the cryptographic keys dramatically amplified attacker capabilities. Once extracted, the keys enabled both decryption of legitimate data and creation of attacker-controlled payloads that the server inherently trusted.
The lack of early public disclosure or a CVE also complicates detection and response efforts.
Key Takeaways
Attackers are actively exploiting Gladinet CentreStack cryptographic weaknesses
Static key material enables persistent and reusable attacks
ViewState deserialization remains a reliable exploitation path
At least nine organizations have confirmed impact
No CVE has been assigned despite active exploitation
Immediate updates and IoC review are critical

