Description
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
Published: 2025-11-10
Score: 9.1 Critical
EPSS: 75.9% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 13 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:*

Wed, 12 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-11-12T00:00:00+00:00', 'dueDate': '2025-12-03T00:00:00+00:00'}


Wed, 12 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Gladinet
Gladinet triofox
Vendors & Products Gladinet
Gladinet triofox

Mon, 10 Nov 2025 15:45:00 +0000


Mon, 10 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
Description Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Gladinet Triofox
cve-icon MITRE

Status: PUBLISHED

Assigner: Mandiant

Published:

Updated: 2026-02-26T17:47:04.149Z

Reserved: 2025-10-29T16:41:20.748Z

Link: CVE-2025-12480

cve-icon Vulnrichment

Updated: 2025-11-11T15:34:49.641Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-10T15:15:36.527

Modified: 2025-11-14T02:00:02.350

Link: CVE-2025-12480

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-12T12:50:11Z

Weaknesses