CISA Warns of Actively Exploited Vulnerability in Gladinet CentreStack and Triofox
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an actively exploited vulnerability affecting Gladinet CentreStack and Triofox, two widely used enterprise file-sharing and remote access platforms.
The vulnerability has been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog, confirming that it is already being leveraged in real-world attacks.
What is affected
The issue impacts internet-exposed instances of:
Gladinet CentreStack
Gladinet Triofox
Both platforms are commonly deployed by organizations to enable secure file access, collaboration, and remote work — often integrated with Active Directory and cloud storage services.
Why this matters
According to CISA, exploitation of this vulnerability may allow attackers to:
gain unauthorized access to enterprise environments
abuse trusted file-sharing infrastructure
move laterally inside networks
access sensitive data and business resources
Because these platforms often sit at the intersection of identity, cloud access, and file services, compromise can have far-reaching impact across an organization.
DIAMATIX Perspective
This incident highlights a recurring pattern we see across enterprise environments:
Infrastructure components that are trusted, exposed, and insufficiently monitored become high-value targets.
File-sharing and remote access platforms are no longer “support tools” — they are critical security surfaces.
Active exploitation reinforces the need for:
continuous exposure management
timely patching
monitoring of identity-centric services
correlation of suspicious activity across cloud and on-prem environments
Security maturity today is defined not only by prevention, but by how quickly exploitation is detected and contained.
Recommended actions
CISA urges organizations to:
apply vendor-provided patches immediately
review external exposure of CentreStack and Triofox instances
monitor for abnormal access patterns and lateral movement
ensure logging and detection capabilities are in place
Sources:
CISA – Known Exploited Vulnerabilities Catalog
Gladinet Security Advisory
CybersecurityNews
Trusted · Innovative · Vigilant




