Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
History

Thu, 13 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:*

Wed, 12 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-11-12T00:00:00+00:00', 'dueDate': '2025-12-03T00:00:00+00:00'}


Wed, 12 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Gladinet
Gladinet triofox
Vendors & Products Gladinet
Gladinet triofox

Mon, 10 Nov 2025 15:45:00 +0000


Mon, 10 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
Description Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mandiant

Published: 2025-11-10T14:20:40.677Z

Updated: 2025-11-12T17:20:24.201Z

Reserved: 2025-10-29T16:41:20.748Z

Link: CVE-2025-12480

cve-icon Vulnrichment

Updated: 2025-11-11T15:34:49.641Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-10T15:15:36.527

Modified: 2025-11-14T02:00:02.350

Link: CVE-2025-12480

cve-icon Redhat

No data.