top of page

Critical Triofox Zero-Day (CVE-2025-12480): Unauthenticated Admin Takeover Through Host Header Bypass

  • Nov 11, 2025
  • 2 min read

Key Findings


  • Researchers at Mandiant Threat Defense, part of Google Cloud Security Operations, have revealed a critical unauthenticated access vulnerability in Gladinet's Triofox file-sharing platform (CVE-2025-12480).

  • The vulnerability allowed attackers to bypass authentication, create administrative accounts, and achieve SYSTEM-level code execution through a chained attack path.

  • The exploitation campaign was first detected on August 24, 2025, when Google Threat Intelligence Group (GTIG) observed a threat cluster tracked as UNC6485 leveraging the Triofox flaw in combination with abuse of the product's built-in antivirus feature.

  • Gladinet has released a fix, and the vulnerability is resolved in newer versions of Triofox.


Background


  • Triofox is a file-sharing platform developed by Gladinet, a cloud storage and collaboration software company.

  • The vulnerability (CVE-2025-12480) allowed unauthenticated attackers to bypass security controls and gain administrative access to the Triofox web interface.

  • Mandiant's Google Security Operations (SecOps) platform detected anomalous activity indicating potential exploitation of Triofox servers, leading to the investigation.


Technical Details


  • The root cause of CVE-2025-12480 was an insecure implementation of access control checks within the Triofox web interface.

  • Access to critical configuration pages could be granted by spoofing the HTTP Host header to "localhost", tricking the application into assuming the request was local.

  • This bypassed all authentication checks, effectively allowing unauthenticated attackers to run the setup process remotely.

  • Once inside, the attackers used their newly created admin account to exploit Triofox's antivirus configuration feature, achieving code execution as SYSTEM.

  • The attackers deployed a malicious batch script that downloaded and executed a second-stage payload masquerading as a legitimate software installer.

  • The payload was a Zoho Unified Endpoint Management System (UEMS) installer, which the attackers used to deploy Zoho Assist and AnyDesk remote access tools.

  • The attackers then used PuTTY and Plink to create an SSH tunnel that redirected RDP traffic through encrypted channels on port 433, enabling covert persistence and bypassing network perimeter controls.


Impact and Mitigation


  • The exploitation of CVE-2025-12480 allowed the threat actor to gain full control over the targeted Triofox servers, compromising the security of the file-sharing platform and the networks it protects.

  • Mandiant has confirmed that Gladinet has released a fix for the vulnerability, and it is resolved in newer versions of Triofox.

  • Organizations using Triofox are advised to update to the latest version to mitigate the risk of exploitation.


Sources


  • https://securityonline.info/critical-triofox-zero-day-cve-2025-12480-under-active-exploit-host-header-bypass-allows-unauthenticated-admin-takeover/

  • https://securityonline.info/critical-watchguard-firebox-flaw-cve-2025-59396-cvss-9-8-allows-unauthenticated-admin-ssh-takeover-via-default-credentials/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page