The following enhancements and improvements are now available to Censys users.
Rapid Response
The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.
- Vulnerability in FortiSwitch Allows Unauthenticated Attackers to Change Admin Passwords (CVE-2024-48887)
- Use the following queries to find Fortinet FortiSwitch instances. Not all of these are necessarily vulnerable, as specific version information may not be available.
- Platform query
- Legacy Search query
- ASM query
- Actively Exploited Deserialization Vulnerability in Gladinet CentreStack Secure File Sharing Software (CVE-2025-30406)
- The queries below can be used to identify exposed instances of Gladinet CentreStack, but they are not necessarily vulnerable to the exploit.
- Platform query
- Legacy Search query
- ASM query
- ASM risk query
- This query can be used to identify exposed instances of Gladinet CentreStack that are vulnerable to the exploit.
New fingerprints
Added the following fingerprints.
Type | Name | Description | Query |
software | Gladinet Centrestack | This is a Gladinet Centrestack Server. | |
software | Fortinet FortiSwitch | This is a Fortinet FortiSwitch device. | |
software | Dell PowerProtect | Dell PowerProtect Data Domain and Data Manager | |
software | CE-WAF Proactive Web Application Firewall | CE-WAF is a custom or internal Web Application Firewall solution | |
software | Aikido Zen WAF | ZenWAF is a Web Application Firewall solution produced by Aikido | |
risk | Vulnerable Gladinet CentreStack [CVE-2025-30406] | Gladinet CentreStack through version 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use. |