CVE-2025-12480
Gladinet Triofox Improper Access Control Vulnerability - [Actively Exploited]
Description
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
INFO
Published Date :
Nov. 10, 2025, 3:15 p.m.
Last Modified :
Nov. 14, 2025, 2 a.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Gladinet Triofox contains an improper access control vulnerability that allows access to initial setup pages even after setup is complete.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://access.triofox.com/releases_history ; https://nvd.nist.gov/vuln/detail/CVE-2025-12480
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 027e81ed-0dd4-4685-ab4d-884aec5bb484 | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update Triofox to version 16.7.10368.56560 or newer.
- Verify setup pages are inaccessible post-update.
Public PoC/Exploit Available at Github
CVE-2025-12480 has a 4 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-12480.
| URL | Resource |
|---|---|
| https://access.triofox.com/releases_history/ | Release Notes |
| https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 | Exploit Third Party Advisory |
| https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md | Third Party Advisory |
| https://www.triofox.com/ | Product |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480 | US Government Resource |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-12480 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-12480
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Cyber Security Knowledge Graph from unstructured datasources.
Python Dockerfile
None
Python
List of real-world threats against endpoint protection software
antivirus security incidents exploits vulnerability endpoint-protection
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-12480 vulnerability anywhere in the article.
-
Help Net Security
Week in review: Windows kernel flaw patched, suspected Fortinet FortiWeb zero-day exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adopting a counterintelligence mindset in luxury logistics In this Help Net Security interview, Andrea ... Read more
-
SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 46
The Good | FBI and Europol Arrest Ransomware Broker and Dismantle Major Botnet Russian national, Aleksey Olegovich Volkov, is set to plead guilty for acting as an initial access broker (IAB) for Yanlu ... Read more
-
The Cyber Express
Akira Ransomware Group Poses ‘Imminent Threat’ to Critical Infrastructure: CISA
The Akira ransomware group poses an “imminent threat to critical infrastructure,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today. CISA joined with the FBI, other U.S. ag ... Read more
-
Help Net Security
“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again)
CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls. “In C ... Read more
-
The Hacker News
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks
Nov 13, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Firewar ... Read more
-
TheCyberThrone
CISA KEV Catalog Update November 2025
November 13, 2025The following vulnerabilities were recently added to the CISA Known Exploited Vulnerabilities (KEV) catalog and involve WatchGuard Firebox, Microsoft Windows, and Gladinet Triofox pro ... Read more
-
BleepingComputer
Hackers abuse Triofox antivirus feature to deploy remote access tools
Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet's Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. The ... Read more
-
Help Net Security
CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)
CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian agencies to address it by the ... Read more
-
security.nl
Antivirusfunctionaliteit in Gladinet Triofox uitgebuit voor installeren van malware
Google's Mandiant Threat Defense waarschuwt voor een actief uitgebuit lek (CVE-2025-12480) in Gladinet’s Triofox-platform voor bestandsdeling en toegang op afstand. Het gaat om een kritieke kwetsbaa ... Read more
-
Help Net Security
Attackers exploited another Gladinet Triofox zero-day (CVE-2025-12480)
Attackers have exploited a now-fixed vulnerability (CVE-2025-12480) in the Gladinet Triofox secure file sharing and remote access platform while it was still a zero-day, Mandiant revealed on Monday. C ... Read more
-
CybersecurityNews
SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks
SAP released its monthly Security Patch Day updates, addressing 18 new security notes and providing two updates to existing ones, focusing on vulnerabilities that could enable remote code execution an ... Read more
-
CybersecurityNews
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature
Google Mandiant has disclosed active exploitation of CVE-2025-12480, a critical unauthenticated access vulnerability in Gladinet’s Triofox file-sharing platform. The threat cluster tracked as UNC6485 ... Read more
-
Daily CyberSecurity
Critical Triofox Zero-Day (CVE-2025-12480) Under Active Exploit: Host Header Bypass Allows Unauthenticated Admin Takeover
CVE-2025-12480 exploitation chain | Image: Mandiant Threat Defense Researchers at Mandiant Threat Defense, part of Google Cloud Security Operations, have revealed that a critical unauthenticated acces ... Read more
-
The Hacker News
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
Nov 10, 2025Ravie LakshmananVulnerability / Incident Response Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet's Triofox fi ... Read more
-
Google Cloud
No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
Written by: Stallone D'Souza, Praveeth DSouza, Bill Glynn, Kevin O'Flynn, Yash Gupta Welcome to the Frontline Bulletin Series Straight from Mandiant Threat Defense, the "Frontline Bulletin" series bri ... Read more
The following table lists the changes that have been made to the
CVE-2025-12480 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Nov. 14, 2025
Action Type Old Value New Value Added Date Added 2025-11-12 Added Due Date 2025-12-03 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name Gladinet Triofox Improper Access Control Vulnerability -
Initial Analysis by [email protected]
Nov. 13, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.10368.56560 Added Reference Type Mandiant Inc.: https://access.triofox.com/releases_history/ Types: Release Notes Added Reference Type Mandiant Inc.: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 Types: Exploit, Third Party Advisory Added Reference Type Mandiant Inc.: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md Types: Third Party Advisory Added Reference Type Mandiant Inc.: https://www.triofox.com/ Types: Product Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480 Types: US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Nov. 12, 2025
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480 -
CVE Modified by [email protected]
Nov. 10, 2025
Action Type Old Value New Value Added Reference https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 -
New CVE Received by [email protected]
Nov. 10, 2025
Action Type Old Value New Value Added Description Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Added CWE CWE-284 Added Reference https://access.triofox.com/releases_history/ Added Reference https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md Added Reference https://www.triofox.com/