CISA Issues Urgent Warning Over CentreStack's Critical Vulnerability
- John Jordan
- 5 days ago
- 2 min read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a severe vulnerability in Gladinet CentreStack, a cloud server and collaboration platform. This flaw, identified as CVE-2025-30406, has been actively exploited in the wild, prompting immediate action from organizations using the software.

Key Takeaways
Vulnerability Identified: CVE-2025-30406, with a CVSS score of 9.0, allows for remote code execution.
Exploitation in the Wild: The vulnerability has been actively exploited since March 2025.
Immediate Patching Required: Gladinet has released a patch in version 16.4.10315.56368, urging users to update immediately.
Temporary Mitigation: Organizations unable to patch should rotate the hard-coded machineKey as a temporary measure.
Understanding The Vulnerability
The vulnerability stems from a hard-coded cryptographic key used in the management of ViewState integrity verification within the application. Specifically, the issue lies in the use of a hard-coded "machineKey" in the IIS web.config file. This allows attackers who know or can guess the machineKey to forge ViewState payloads, leading to potential remote code execution on the server.
Exploitation Details
Active Exploitation: Reports indicate that the vulnerability has been exploited since March 2025, making it a zero-day threat.
Attack Vector: Attackers can serialize a payload for server-side deserialization, which can lead to unauthorized code execution.
Targeted Organizations: While specific targets have not been disclosed, the nature of the vulnerability suggests that any organization using CentreStack could be at risk.
Recommended Actions
CISA has strongly urged all organizations using Gladinet CentreStack to take the following actions:
Update Software: Apply the latest patch (version 16.4.10315.56368) released on April 3, 2025.
Rotate MachineKey: If immediate patching is not feasible, rotate the machineKey value as a temporary mitigation strategy.
Monitor for Exploits: Stay vigilant for any signs of exploitation and ensure that security measures are in place to detect unauthorized access.
Broader Implications
This incident highlights the ongoing challenges organizations face in securing their applications against vulnerabilities. The use of hard-coded keys is a significant security risk, and organizations are encouraged to adopt best practices in application security, including:
Regularly updating software and applying security patches.
Conducting security audits to identify and remediate vulnerabilities.
Implementing robust access controls and monitoring systems to detect potential breaches.
The CISA warning regarding the CentreStack vulnerability serves as a critical reminder of the importance of cybersecurity vigilance. Organizations must prioritize patching and security best practices to protect against potential exploits that could lead to severe consequences. As cyber threats continue to evolve, staying informed and proactive is essential for safeguarding sensitive data and maintaining operational integrity.
As cybercriminals continue to adapt their strategies, awareness and education remain crucial in combating these threats. Cybersecurity is critical. BetterWorld Technology offers cutting-edge solutions to combat evolving threats while driving innovation. Protect your business with confidence—contact us today for a consultation!
Sources
CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks, The Hacker News.
CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days, SecurityWeek.