
Urgent Security Alert: Actively Exploited Gladinet Zero-Day Flaw Requires Immediate Patching
A critical zero-day vulnerability has been discovered in Gladinet’s popular file-sharing and remote access software, and security experts warn that it is being actively exploited in the wild. This flaw, tracked as CVE-2024-5585, poses a significant threat to organizations relying on this platform, potentially leading to data breaches and complete server compromise.
If your organization uses Gladinet Cloud Enterprise, immediate action is required to protect your network and sensitive data.
Understanding the Threat: CVE-2024-5585
The vulnerability is a Local File Inclusion (LFI) flaw found within the CentreStack component of Gladinet’s software. LFI vulnerabilities are particularly dangerous because they allow an unauthenticated attacker to trick the server into accessing, reading, or even executing files that reside outside of its intended web root directory.
By sending a specially crafted web request to a vulnerable server, an attacker can exploit this flaw to:
- Read sensitive system files, including configuration files, user credentials, and other confidential data.
- Gather critical information about the server’s structure and security settings, paving the way for further attacks.
- Escalate their privileges, ultimately leading to Remote Code Execution (RCE).
Achieving RCE is the worst-case scenario, as it grants an attacker full control over the affected server. From there, they can deploy malware, install ransomware, exfiltrate data, or use the compromised machine as a launchpad for attacking other systems on your network.
CISA Confirms Active Exploitation
The severity of this vulnerability has been officially recognized by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The agency has added CVE-2024-5585 to its Known Exploited Vulnerabilities (KEV) catalog.
Inclusion in the KEV catalog is a definitive confirmation that a vulnerability is not just a theoretical risk but is being actively used by malicious actors in real-world attacks. CISA has mandated that all Federal Civilian Executive Branch agencies patch this flaw by early July, highlighting the urgency for all affected organizations to do the same.
How to Protect Your Systems: Immediate Action Required
Gladinet has responded to the discovery by releasing a security update to address the vulnerability. To secure your infrastructure, it is crucial to take the following steps without delay:
- Identify Vulnerable Systems: Determine if your organization is running a version of Gladinet Cloud Enterprise that is susceptible to this attack.
- Apply the Patch Immediately: The vulnerability is patched in Gladinet version 14.6.14138 and newer. Administrators must update their instances to this version or a more recent one as soon as possible. Delaying this update leaves your systems exposed to ongoing attacks.
- Monitor for Suspicious Activity: After patching, review server logs for any unusual or unauthorized access attempts that may have occurred before the update was applied. Look for suspicious patterns in web requests that could indicate an attempted or successful exploit.
Beyond the Patch: Strengthening Your Security Posture
While patching is the most critical first step, this incident serves as a powerful reminder of the importance of a defense-in-depth security strategy. Consider implementing these best practices to further harden your systems:
- Network Segmentation: Isolate critical servers from other parts of your network to limit the lateral movement of an attacker in the event of a breach.
- Principle of Least Privilege: Ensure that all user accounts and system services run with the minimum level of permissions necessary for their function.
- Regular Security Audits: Proactively scan your applications and network for vulnerabilities and misconfigurations before they can be exploited.
- Web Application Firewall (WAF): A properly configured WAF can help detect and block malicious requests, providing an additional layer of protection against LFI and other web-based attacks.
This zero-day vulnerability is a clear and present danger. Do not wait for signs of a compromise. Protect your organization by applying the necessary patches immediately.
Source: https://www.bleepingcomputer.com/news/security/gladinet-fixes-actively-exploited-zero-day-in-file-sharing-software/


