Known Exploited Vulnerability
9.1
CRITICAL CVSS 3.1
CVE-2025-12480
Gladinet Triofox Improper Access Control Vulnerability - [Actively Exploited]
Description

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

INFO

Published Date :

Nov. 10, 2025, 3:15 p.m.

Last Modified :

Nov. 14, 2025, 2 a.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Gladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Notes :

https://access.triofox.com/releases_history ; https://nvd.nist.gov/vuln/detail/CVE-2025-12480

Affected Products

The following products are affected by CVE-2025-12480 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Gladinet triofox
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL 027e81ed-0dd4-4685-ab4d-884aec5bb484
CVSS 3.1 CRITICAL [email protected]
Solution
Update Triofox to version 16.7.10368.56560 or later to fix improper access control.
  • Update Triofox to version 16.7.10368.56560 or newer.
  • Verify setup pages are inaccessible post-update.
Public PoC/Exploit Available at Github

CVE-2025-12480 has a 4 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-12480.

URL Resource
https://access.triofox.com/releases_history/ Release Notes
https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 Exploit Third Party Advisory
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md Third Party Advisory
https://www.triofox.com/ Product
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-12480 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 2 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 13, 2025, 4:43 p.m. This repo has been linked 1 different CVEs too.

Cyber Security Knowledge Graph from unstructured datasources.

Python Dockerfile

Updated: 1 week, 2 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 12, 2025, 3:28 p.m. This repo has been linked 2 different CVEs too.

None

Python

Updated: 4 days, 21 hours ago
1 stars 0 fork 0 watcher
Born at : Oct. 29, 2024, 8:10 p.m. This repo has been linked 10 different CVEs too.

List of real-world threats against endpoint protection software

antivirus security incidents exploits vulnerability endpoint-protection

Updated: 2 weeks, 2 days ago
215 stars 38 fork 38 watcher
Born at : Nov. 20, 2016, 4:46 p.m. This repo has been linked 11 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-12480 vulnerability anywhere in the article.

  • Help Net Security
Week in review: Windows kernel flaw patched, suspected Fortinet FortiWeb zero-day exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adopting a counterintelligence mindset in luxury logistics In this Help Net Security interview, Andrea ... Read more

Published Date: Nov 16, 2025 (2 weeks ago)
  • SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 46

The Good | FBI and Europol Arrest Ransomware Broker and Dismantle Major Botnet Russian national, Aleksey Olegovich Volkov, is set to plead guilty for acting as an initial access broker (IAB) for Yanlu ... Read more

Published Date: Nov 14, 2025 (2 weeks, 2 days ago)
  • The Cyber Express
Akira Ransomware Group Poses ‘Imminent Threat’ to Critical Infrastructure: CISA

The Akira ransomware group poses an “imminent threat to critical infrastructure,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today. CISA joined with the FBI, other U.S. ag ... Read more

Published Date: Nov 13, 2025 (2 weeks, 2 days ago)
  • Help Net Security
“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again)

CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls. “In C ... Read more

Published Date: Nov 13, 2025 (2 weeks, 3 days ago)
  • The Hacker News
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

Nov 13, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Firewar ... Read more

Published Date: Nov 13, 2025 (2 weeks, 3 days ago)
  • TheCyberThrone
CISA KEV Catalog Update November 2025

November 13, 2025The following vulnerabilities were recently added to the CISA Known Exploited Vulnerabilities (KEV) catalog and involve WatchGuard Firebox, Microsoft Windows, and Gladinet Triofox pro ... Read more

Published Date: Nov 13, 2025 (2 weeks, 3 days ago)
  • BleepingComputer
Hackers abuse Triofox antivirus feature to deploy remote access tools

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet's Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. The ... Read more

Published Date: Nov 11, 2025 (2 weeks, 4 days ago)
  • Help Net Security
CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)

CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian agencies to address it by the ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • security.nl
Antivirusfunctionaliteit in Gladinet Triofox uitgebuit voor installeren van malware

Google's Mandiant Threat Defense waarschuwt voor een actief uitgebuit lek (CVE-2025-12480) in Gladinet’s Triofox-platform voor bestandsdeling en toegang op afstand. Het gaat om een kritieke kwetsbaa ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • Help Net Security
Attackers exploited another Gladinet Triofox zero-day (CVE-2025-12480)

Attackers have exploited a now-fixed vulnerability (CVE-2025-12480) in the Gladinet Triofox secure file sharing and remote access platform while it was still a zero-day, Mandiant revealed on Monday. C ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • CybersecurityNews
SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

SAP released its monthly Security Patch Day updates, addressing 18 new security notes and providing two updates to existing ones, focusing on vulnerabilities that could enable remote code execution an ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • CybersecurityNews
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Google Mandiant has disclosed active exploitation of CVE-2025-12480, a critical unauthenticated access vulnerability in Gladinet’s Triofox file-sharing platform. The threat cluster tracked as UNC6485  ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • Daily CyberSecurity
Critical Triofox Zero-Day (CVE-2025-12480) Under Active Exploit: Host Header Bypass Allows Unauthenticated Admin Takeover

CVE-2025-12480 exploitation chain | Image: Mandiant Threat Defense Researchers at Mandiant Threat Defense, part of Google Cloud Security Operations, have revealed that a critical unauthenticated acces ... Read more

Published Date: Nov 11, 2025 (2 weeks, 5 days ago)
  • The Hacker News
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Nov 10, 2025Ravie LakshmananVulnerability / Incident Response Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet's Triofox fi ... Read more

Published Date: Nov 10, 2025 (2 weeks, 5 days ago)
  • Google Cloud
No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480

Written by: Stallone D'Souza, Praveeth DSouza, Bill Glynn, Kevin O'Flynn, Yash Gupta Welcome to the Frontline Bulletin Series Straight from Mandiant Threat Defense, the "Frontline Bulletin" series bri ... Read more

Published Date: Nov 10, 2025 (2 weeks, 6 days ago)

The following table lists the changes that have been made to the CVE-2025-12480 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Nov. 14, 2025

    Action Type Old Value New Value
    Added Date Added 2025-11-12
    Added Due Date 2025-12-03
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name Gladinet Triofox Improper Access Control Vulnerability
  • Initial Analysis by [email protected]

    Nov. 13, 2025

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.10368.56560
    Added Reference Type Mandiant Inc.: https://access.triofox.com/releases_history/ Types: Release Notes
    Added Reference Type Mandiant Inc.: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 Types: Exploit, Third Party Advisory
    Added Reference Type Mandiant Inc.: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md Types: Third Party Advisory
    Added Reference Type Mandiant Inc.: https://www.triofox.com/ Types: Product
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480 Types: US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Nov. 12, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
  • CVE Modified by [email protected]

    Nov. 10, 2025

    Action Type Old Value New Value
    Added Reference https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480
  • New CVE Received by [email protected]

    Nov. 10, 2025

    Action Type Old Value New Value
    Added Description Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-284
    Added Reference https://access.triofox.com/releases_history/
    Added Reference https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md
    Added Reference https://www.triofox.com/
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.1
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact