This vulnerability allows attackers to forge ViewState data, potentially leading to unauthorized actions or remote code execution (RCE) on affected web servers.
Immediate remediation is urged, as exploitation has already been observed in active attacks.
The vulnerability stems from the use of hardcoded or inadequately protected machineKey values in the IIS web.config file.
These keys are responsible for securing ASP.NET ViewState data—a mechanism used to maintain page state across HTTP requests.
If an attacker obtains or predicts the machineKey, they can bypass integrity checks and craft malicious ViewState payloads.
In configurations where deserialization is enabled, this could lead to RCE by exploiting insecure deserialization processes.
Successful exploitation enables:
1. Apply the Patched Version (Build 16.4.10315.56368)
Download the updated installer from Gladinet Cloud Enterprise. The patch automatically generates a unique machineKey during installation, eliminating reliance on default or static keys.
2. Manual Mitigation for Immediate Risk Reduction
For systems unable to update immediately, rotate machineKey values manually:
C:Program Files (x86)Gladinet Cloud Enterpriseroot and back up web.config.machineKey entries from portalweb.config and restart IIS.machineKey on the primary node and replicate it across all worker nodes.portalweb.config on all nodes does not contain legacy machineKey configurations.3. Additional Hardening Recommendations
Refer to the KB Article for guidelines on securing CentreStack clusters, including network isolation and periodic key rotation.
Organizations using ASP.NET applications, particularly those with CentreStack deployments, must prioritize patching or key rotation.
The combination of active exploitation and the potential for RCE elevates this vulnerability to critical severity.
System administrators are advised to validate configurations and monitor for anomalous activity.
For further details on secure deserialization practices and ViewState hardening, consult Microsoft’s ASP.NET documentation and the CentreStack security advisory.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post CentreStack 0-Day Flaw Enables Remote Code Execution on Web Servers appeared first on Cyber Security News.
Mozilla has released Firefox 150, addressing 41 security vulnerabilities, including multiple high-severity flaws that could…
A critical security vulnerability, tracked as CVE-2026-22752, has been discovered in Spring Security Authorization Server,…
Cybersecurity organization SEAL (Security Alliance) has issued a critical warning about a sustained and escalating…
Atlassian has disclosed a critical security vulnerability in Bamboo Data Center and Server that could…
Tension: We’re kinder to strangers than family, not from coldness but from unhealed wounds. Noise:…
Tension: The wellness industry’s explosive growth coincides with declining collective wellbeing, revealing a profitable paradox.…
This website uses cookies.