top of page

Critical Vulnerability in MSP File Sharing Platform: Why SMBs Need to Embrace Shared Responsibility

  • Writer: InfraGard NCR
    InfraGard NCR
  • Apr 9, 2025
  • 3 min read

Updated: Apr 24, 2025

Since March 2025, attackers have actively exploited a critical remote code execution (RCE) vulnerability (CVE-2025-30406) affecting the Gladinet CentreStack file-sharing platform. This security incident highlights the importance of shared responsibility between small and medium-sized businesses (SMBs) and their managed service providers (MSPs).


Understanding the Vulnerability

The vulnerability affects CentreStack, a platform commonly used by MSPs to provide cloud-like file services to their customers, including file sharing, backup, collaboration, and remote access. CVE-2025-30406 is a deserialization vulnerability caused by hardcoded machineKey use in the CentreStack portal's IIS web config file.


This security flaw allows attackers who obtain or predict the machinekey to forge ViewState payloads that pass integrity checks, potentially leading to remote code execution on the web server. The vulnerability affects CentreStack versions up to and including v16.1.10296.56315 and has been fixed in version 16.4.10315.56368, released on April 3, 2025. See https://www.helpnetsecurity.com/2025/04/09/rce-gladinet-centrestack-file-sharing-exploited-cve-2025-30406/ for more information


Additionally, Triofox, Gladinet's enterprise-focused file sharing platform, is also affected by this vulnerability, and exploitation has been observed in the wild.


The Shared Responsibility Model for SMBs and MSPs

When SMBs partner with MSPs, both parties must understand their roles in maintaining security. The shared responsibility model is a security framework that outlines the responsibilities of service providers and their customers.


For SMBs using managed services, this means:


  • MSPs are responsible for securing the infrastructure, implementing security measures, and providing expertise.

  • SMBs are responsible for understanding their security needs, ensuring proper implementation, and maintaining vigilance.

This partnership is crucial because 43% of all cyberattacks target small businesses, with potentially devastating financial consequences. Some small companies leave in the months following a massive cyber-attack as they might not be able to support their business while rebuilding and delaying with any breach notification processes.




Server rack with glowing green and blue lights, and colorful cables connected.
Manage your risks while using managed service providers


3 Actionable Tips for SMBs Using Managed Services

1. Establish Clear Security Protocols and Communication Channels

SMBs should work with their MSPs to establish clear security protocols and regular communication channels. This includes:

  • Defining security responsibilities in your service level agreement (SLA)

  • Scheduling regular security reviews and updates

  • Creating an incident response plan that clearly outlines steps to take when vulnerabilities like CVE-2025-30406 are discovered

When vulnerabilities are announced, SMBs should immediately contact their MSP to verify if they're affected and what remediation steps are being taken. Regarding the CentreStack vulnerability, this would mean confirming whether your systems need updating to version 16.4.10315.56368 or if the machineKey needs to be manually rotated.


2. Implement Multi-Layered Security Measures

Don't rely solely on your MSP for all security needs. Implement additional security layers:

  • Enable multi-factor authentication (MFA) for all critical systems and services

  • Establish secure remote access policies, essential with the rise of remote work

  • Implement data encryption for sensitive information both at rest and in transit

  • Ensure regular data backups are performed and tested

These measures provide protection even if one security layer is compromised. For example, if an attacker exploits the CentreStack vulnerability, MFA could prevent them from accessing sensitive systems despite having initial access.


3. Regularly Audit Your MSP's Security Practices

SMBs should regularly audit their MSP's security practices:

  • Request documentation of security protocols and compliance certifications

  • Verify that your MSP stays current with security patches and updates

  • Ensure they perform regular vulnerability assessments and penetration testing

  • Confirm they have a disaster recovery plan in place

Ask specific questions about how they handle vulnerabilities like the one affecting CentreStack. Do they have automated systems to detect and patch vulnerabilities? How quickly do they respond to critical security announcements? How do they communicate these issues to clients?


Conclusion

The exploitation of CVE-2025-30406 in the CentreStack platform reminds us that cybersecurity is a shared responsibility between SMBs and their MSPs. By establishing clear communication, implementing multi-layered security, and regularly auditing MSP security practices, SMBs can better protect themselves from evolving cyber threats.


Remember, while MSPs provide valuable expertise and resources, the ultimate responsibility for your business's security cannot be completely outsourced. A collaborative approach to security is essential in today's threat landscape.

Comments


© 2025 InfraGard National Capital Region Members Alliance 

WARRANTY DISCLAIMER  The FBI, InfraGard, and its affiliates provide information, including but not limited to software, documentation, training, and other guidance to be known as “materials.” The materials are provided as-is and we expressly disclaim any and all warranties, express or implied, including, and without limitation, the implied warranties of merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, and integration, and warranties arising out of course of dealing or usage of trade. You agree that, as between you and the FBI, InfraGard, and its affiliates, you are responsible for the outcome of the use of materials made available, including but not limited to adherence to licensing requirements, and taking legal and regulatory considerations into account. There is no guarantee of accuracy, completeness, timeliness, or correct sequencing of the information provided.

  • InfragardNCR INMA PrivacyStatement
  • White LinkedIn Icon
  • Twitter Clean
bottom of page