Contacts
Book a Meet
Close

Contacts

Bulgaria, Kavarna
Saudi Arabia, Riyadh

+359 875 328030

sales@diamatix.com

CISA Warns of Actively Exploited Vulnerability in Gladinet CentreStack and Triofox

116257

CISA Warns of Actively Exploited Vulnerability in Gladinet CentreStack and Triofox

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an actively exploited vulnerability affecting Gladinet CentreStack and Triofox, two widely used enterprise file-sharing and remote access platforms.

The vulnerability has been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog, confirming that it is already being leveraged in real-world attacks.

What is affected

The issue impacts internet-exposed instances of:

  • Gladinet CentreStack

  • Gladinet Triofox

Both platforms are commonly deployed by organizations to enable secure file access, collaboration, and remote work — often integrated with Active Directory and cloud storage services.

Why this matters

According to CISA, exploitation of this vulnerability may allow attackers to:

  • gain unauthorized access to enterprise environments

  • abuse trusted file-sharing infrastructure

  • move laterally inside networks

  • access sensitive data and business resources

Because these platforms often sit at the intersection of identity, cloud access, and file services, compromise can have far-reaching impact across an organization.

DIAMATIX Perspective

This incident highlights a recurring pattern we see across enterprise environments:

Infrastructure components that are trusted, exposed, and insufficiently monitored become high-value targets.

File-sharing and remote access platforms are no longer “support tools” — they are critical security surfaces.
Active exploitation reinforces the need for:

  • continuous exposure management

  • timely patching

  • monitoring of identity-centric services

  • correlation of suspicious activity across cloud and on-prem environments

Security maturity today is defined not only by prevention, but by how quickly exploitation is detected and contained.

Recommended actions

CISA urges organizations to:

  • apply vendor-provided patches immediately

  • review external exposure of CentreStack and Triofox instances

  • monitor for abnormal access patterns and lateral movement

  • ensure logging and detection capabilities are in place


Sources:

  • CISA – Known Exploited Vulnerabilities Catalog

  • Gladinet Security Advisory

  • CybersecurityNews

Contact DIAMATIX

Trusted · Innovative · Vigilant

Subscribe for latest updates & insights

Please enable JavaScript in your browser to complete this form.