The core of this vulnerability lies in the “GenerateSecKey()” function within “GladCtrl64.dll.” This function is meant to generate cryptographic keys for encrypting access tickets that hold user authorization data, enabling file system access. However, because “GenerateSecKey()” consistently returns the same 100-byte string, the resulting cryptographic keys are static. Threat actors can weaponize these unchanging keys to decrypt any ticket the server generates or to create their own access tickets.
GET 50% Discount for VPN/ANTIVIRUS SOFTWARE AT 911Cyber - CODE: bit5025
Source: Hackers Use Gladinet Hard Coded Keys For Unauthorized Access And Code Execution




