In this week’s CyberCall, MSPs were urged to take immediate action in response to a serious CenterStack vulnerability, as well as prepare for major changes in how the industry tracks and shares threat data. CenterStack, a file-syncing platform used by many MSPs and clients, was found to have a critical CVE allowing remote code execution. The attack method is low-effort and publicly available, making it a prime target for threat actors. Once inside, attackers are using tools like PowerShell and Mesh Agent—often misconfigured or overlooked—to maintain persistence. MSPs were encouraged to patch immediately, run Huntress’ free detection script, and evaluate remote access tools across their environments.
The second half of the call tackled a looming challenge: the uncertain future of CVEs (Common Vulnerabilities and Exposures). With funding cuts impacting CISA and MITRE, concerns are rising about the long-term viability of the NVD (National Vulnerability Database). CVEs serve as a critical backbone for every major security tool, scanner, and compliance framework. Without a robust and funded CVE system, MSPs risk losing a shared language for managing and communicating about vulnerabilities—impacting both threat detection and GRC efforts.
Key takeaways for MSPs included prioritizing immediate patching, assuming compromise until proven otherwise, hardening perimeters, improving inventory management of remote tools, and building a proactive security culture. The complexity of modern environments—especially with the rise of cloud and AI—demands a more collaborative and resilient approach to vulnerability intelligence. This Cyber Call served as a reminder that staying ahead of threats requires speed, strategy, and community engagement.