Mandiant Uncovers Active Exploitation of Triofox Vulnerability Allowing Remote Code Execution

Mandiant Uncovers Active Exploitation of Triofox Vulnerability Allowing Remote Code Execution

Google’s Mandiant Threat Defense has revealed that a recently patched critical flaw in Gladinet’s Triofox file-sharing and remote access software has been actively exploited by threat actors. The vulnerability, tracked as CVE-2025-12480 with a CVSS score of 9.1, allows unauthenticated attackers to bypass security checks, gain access to configuration pages, and execute arbitrary code on affected systems.
According to Mandiant, the threat cluster UNC6485 has been exploiting the flaw since August 24, 2025, nearly a month after Gladinet issued a fix in version 16.7.10368.56560. This marks the third major security issue affecting Triofox this year, following CVE-2025-30406 and CVE-2025-11371. The company’s release notes stated, “Added protection for the initial configuration pages. These pages can no longer be accessed after Triofox has been set up.”
Mandiant’s investigation found that attackers exploited the unauthenticated access vulnerability to infiltrate configuration pages and create a new administrative account named Cluster Admin. Using this account, they gained full control over the system and executed follow-on actions.
“To achieve code execution, the attacker logged in using the newly created Admin account. The attacker uploaded malicious files to execute them using the built-in antivirus feature,” said researchers Stallone D’Souza, Praveeth D’Souza, Bill Glynn, Kevin O’Flynn, and Yash Gupta.
The exploit hinged on manipulating Triofox’s antivirus configuration. “To set up the antivirus feature, the user is allowed to provide an arbitrary path for the selected anti-virus. The file configured as the antivirus scanner location inherits the Triofox parent process account privileges, running under the context of the SYSTEM account,” Mandiant explained.
The attackers ran a malicious batch script, “centre_report.bat,” redirecting the antivirus path to execute it. The script downloaded and installed Zoho Unified Endpoint Management System (UEMS) from a malicious IP address, which was then used to deploy Zoho Assist and AnyDesk for remote access. With this access, the adversaries performed reconnaissance, altered credentials, and escalated privileges by adding compromised accounts to Domain Admins.
To avoid detection, the attackers also used tools such as Plink and PuTTY to establish encrypted SSH tunnels for remote desktop access (RDP). While the campaign’s ultimate motive is still unclear, Mandiant strongly advises Triofox customers to update to the latest version, audit admin accounts, and review antivirus configurations to prevent unauthorized script execution.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch