April 11 Advisory: Actively Exploited Deserialization Vulnerability in Gladinet CentreStack Secure File Sharing Software [CVE-2025-30406]

Rapid Response

Date of Disclosure (source): April 3, 2025

Date Reported as Actively Exploited (source): April 8, 2025

CVE-2025-30406 is a critical vulnerability affecting Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368). CentreStack contains a deserialization vulnerability due to the portal’s hardcoded machineKey use

Example of Exposed Gladinet CentreStack Login Portal

Field Details
CVE-ID CVE-2025-30406 – CVSS 9.8 (critical) – assigned by NVD
Vulnerability Description The application uses a hardcoded or improperly protected machineKey in the IIS web[.]config file, which is responsible for securing ASP.NET ViewState data. If an attacker obtains or predicts the machineKey, they can forge ViewState payloads that pass integrity checks. In some scenarios, this can result in ViewState deserialization attacks, potentially leading to remote code execution (RCE) on the web server.
Date of Disclosure April 3, 2025
Affected Assets Gladinet CentreStack (CentreStack portal’s hardcoded machineKey use)
Vulnerable Software Versions  Gladinet CentreStack through version 16.1.10296.56315.
PoC Available? We did not observe any public exploits available at the time of writing. 
Exploitation Status This vulnerability is known to be actively exploited and was added to CISA KEV on April 8, 2025. 
Patch Status This vulnerability has been patched in version 16.4.10315.56368. The vendor has advised users to manually generate new machineKeys if patching their instances is not immediately possible. 

Censys Perspective

At the time of writing, Censys observed 12,694 exposed Gladinet CentreStack instances online, the overwhelming majority (12,229) were virtual hosts . Note that not all instances observed are necessarily vulnerable as we do not always have specific versions available. Note that we do see versions for these devices. However, given the active exploitation of this vulnerability and potential involvement from threat actors, we’ve omitted the vulnerable versions from this advisory. 

Map of Exposed Gladinet CentreStack Instances:

The queries below can be used to identify exposed instances of Gladinet CentreStack, but they are not necessarily vulnerable to the exploit.

Censys Platform Query:

host.services.software: (vendor: “Gladinet” and product: “CentreStack”) or web.software: (vendor: “Gladinet” and product: “CentreStack”)

Censys Search Query:

services.software: (vendor=”Gladinet” and product=”CentreStack”)

Censys ASM Query:

host.services.software: (vendor=”Gladinet” or product=”CentreStack”) or web_entity.instances.software: (vendor=”Gladinet” and product=”CentreStack”)

The query below can be used to identify exposed instances of Gladinet CentreStack that are vulnerable to the exploit.

Risk:

risks.name = “Vulnerable Gladinet CentreStack [CVE-2025-30406]”

Please note that these fingerprints were recently deployed and results may take up to 24 hours to fully propagate. 

References