Improper Access Control in Triofox by Triofox Technologies
CVE-2025-12480
Key Information:
Badges
What is CVE-2025-12480?
CVE-2025-12480 is a vulnerability affecting Triofox, a secure file sharing and collaboration platform developed by Triofox Technologies. This vulnerability stems from improper access control within the software, which allows users to access initial setup pages even after the setup process has been completed. Such unauthorized access can provide opportunities for attackers to manipulate or alter configurations and settings that should be restricted after initial installation. Given that Triofox is intended to facilitate secure file sharing, this flaw presents a serious risk to organizations relying on the platform for sensitive data management and collaboration, potentially leading to unauthorized data exposure and compromise.
Potential impact of CVE-2025-12480
-
Unauthorized Access: Users, including potential attackers, could gain access to sensitive configuration settings or management features, undermining the integrity of the system's security posture and enabling misuse of the platform.
-
Data Breach Risk: With access to the setup pages, unauthorized users could manipulate file sharing permissions or expose sensitive files, increasing the likelihood of data breaches that can have significant legal and financial repercussions for organizations.
-
Operational Disruption: The ability to change configurations or system settings may lead to unintended operational disruptions, impairing the organization's ability to leverage the Triofox platform effectively, resulting in loss of productivity and potential downtime.
CISA has reported CVE-2025-12480
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-12480 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
TrioFox 0 < 16.7.10368.56560
News Articles
Week in review: Windows kernel flaw patched, suspected Fortinet FortiWeb zero-day exploited - Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adopting a counterintelligence mindset in luxury
3 weeks ago
Triofox Antivirus Exploited to Install Remote Access Components
Learn about the critical vulnerability CVE-2025-12480 in Gladinet Triofox and how to protect yourself from hacker attacks that exploit this security flaw.
3 weeks ago
References
EPSS Score
70% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 💰
Used in Ransomware
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 🦅
CISA Reported
- 📈
Vulnerability started trending
- 👾
Exploit known to exist
- 📰
First article discovered by Google Cloud
Vulnerability published
Vulnerability Reserved
