CVE-2025-12480

Analyzed
Published: 10 Nov 2025, 15:15
Last modified:14 Nov 2025, 02:00

Vulnerability Summary

Overall Risk
Critical Risk
79/100
AI Analysis
Emergency
Requires Immediate Action
AI Detection
Active in Wild
Exploitation Detected
CVSS Score
9.1 CRITICAL
CVSS v3.1 (MANDIANT-CVE)
EPSS Score
52.34% CRITICAL
52% probability 0.00%
CISA KEV
Listed
Gladinet
Ransomware
Known Use
Exploits
None found
Dark Web
Activity detected
Telegram
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
Source Identifier: mandiant-cve@google.com
CVSSSourceSeverityExploit.ImpactVector
v4.0n/a
v3.1mandiant-cve@google.com9.1 CRITICAL3.95.2
CVSS:3.1/AV:N/AC:L/PR:N/U...
v3.0n/a
v2.0n/a
62.72%
Current Score
0.00%
98%ile
Percentile Rank
0.00%
Loading chart...
Loading chart...
Improper Access Control CWE-284
Description:The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Vulnerability Name:Gladinet Triofox Improper Access Control Vulnerability
Added to CISA Catalog:12 Nov 2025, 00:00
Action Due:03 Dec 2025, 00:00
Known Ransomware: Ransomware
Required Action:Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.

No known public exploit code indexed (as of 14 Nov 2025, 02:00).

Exploitation status can change quickly once PoC code appears.

Affected Configurations (CPE)

gladinet triofoxVulnerable
Version: *
cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:*
© 2025 CveMate. All rights reserved.v0.1.4