This vulnerability allows attackers to forge ViewState data, potentially leading to unauthorized actions or remote code execution (RCE) on affected web servers.
Immediate remediation is urged, as exploitation has already been observed in active attacks.
The vulnerability stems from the use of hardcoded or inadequately protected machineKey values in the IIS web.config file.
These keys are responsible for securing ASP.NET ViewState data—a mechanism used to maintain page state across HTTP requests.
If an attacker obtains or predicts the machineKey, they can bypass integrity checks and craft malicious ViewState payloads.
In configurations where deserialization is enabled, this could lead to RCE by exploiting insecure deserialization processes.
Successful exploitation enables:
1. Apply the Patched Version (Build 16.4.10315.56368)
Download the updated installer from Gladinet Cloud Enterprise. The patch automatically generates a unique machineKey during installation, eliminating reliance on default or static keys.
2. Manual Mitigation for Immediate Risk Reduction
For systems unable to update immediately, rotate machineKey values manually:
C:Program Files (x86)Gladinet Cloud Enterpriseroot and back up web.config.machineKey entries from portalweb.config and restart IIS.machineKey on the primary node and replicate it across all worker nodes.portalweb.config on all nodes does not contain legacy machineKey configurations.3. Additional Hardening Recommendations
Refer to the KB Article for guidelines on securing CentreStack clusters, including network isolation and periodic key rotation.
Organizations using ASP.NET applications, particularly those with CentreStack deployments, must prioritize patching or key rotation.
The combination of active exploitation and the potential for RCE elevates this vulnerability to critical severity.
System administrators are advised to validate configurations and monitor for anomalous activity.
For further details on secure deserialization practices and ViewState hardening, consult Microsoft’s ASP.NET documentation and the CentreStack security advisory.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post CentreStack 0-Day Flaw Enables Remote Code Execution on Web Servers appeared first on Cyber Security News.
The Oscars just had their seventh tie in the history of the Academy Awards, for…
A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…
The 98th Academy Awards, also known as The Oscars 2026, have finally arrived and are…
BIG COUNTRY, Texas (KTAB/KRBC) - A brand new Texas State Park is now open, and…
Aether OS puts a full-fledged desktop in your browser that ties directly into the AT…
A new weekend has arrived, and today, you can save big on Trails in the…
This website uses cookies.