Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope

Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope

Posted on August 11, 2025August 11, 2025 By CWS

Essential cybersecurity vulnerabilities have been recognized in enterprise-level Zero Belief Community Entry options, probably enabling malicious actors to breach company networks with relative ease.

AmberWolf safety researchers unveiled these vulnerabilities throughout their DEF CON 33 presentation, demonstrating how attackers can exploit authentication weaknesses in merchandise from trade leaders Zscaler, NetSkope, and Verify Level to achieve unauthorized entry to delicate inner techniques and escalate privileges on endpoint units.

Key Takeaways1. Essential flaws in Zscaler, NetSkope, and Verify Level permit attackers to bypass authentication.2. Allow SYSTEM-level entry and cross-tenant knowledge publicity.3. Unpatched flaws exploited within the wild for 16+ months.

Authentication Bypass Vulnerabilities

Essentially the most extreme findings embody a number of authentication bypass vulnerabilities that permit attackers to impersonate reputable customers with out correct credentials. 

In Zscaler’s implementation, researchers found a SAML authentication bypass tracked as CVE-2025-54982, the place the platform didn’t validate that SAML assertions have been appropriately signed. 

This flaw permits full authentication bypass, granting entry to each net proxies and “Non-public Entry” companies that route site visitors to inner company assets.

NetSkope’s vulnerabilities proved equally regarding, with researchers figuring out an authentication bypass in Id Supplier (IdP) enrollment mode that was beforehand documented as CVE-2024-7401. 

The corporate’s personal safety advisory acknowledges in-the-wild exploitation by bug bounty hunters, but many organizations proceed utilizing this insecure configuration 16 months after preliminary disclosure. 

Moreover, NetSkope suffers from arbitrary cross-organization consumer impersonation when attackers possess a non-revocable “OrgKey” worth alongside any enrollment key, enabling full authentication bypass throughout completely different tenants.

Privilege Escalation and Cross-Tenant Information Publicity

Past authentication bypasses, the analysis revealed privilege escalation vulnerabilities that might compromise endpoint safety. 

NetSkope’s shopper comprises a neighborhood privilege escalation flaw, permitting attackers to realize SYSTEM-level entry by coercing the shopper to speak with a rogue server. 

This vulnerability, presently pending CVE task, demonstrates how ZTNA shoppers can develop into assault vectors for native system compromise, reads the AmberWolf report.

Verify Level’s Perimeter 81 service uncovered a hard-coded SFTP key vulnerability, offering unauthorized entry to an SFTP server containing shopper logs from a number of tenants. 

These logs embody JWT materials that might facilitate authentication in opposition to the Perimeter 81 service, representing a major cross-tenant knowledge publicity danger.

As organizations more and more undertake ZTNA options to interchange conventional VPNs, these discoveries underscore the significance of rigorous safety validation and vendor accountability in defending company community infrastructure from subtle menace actors.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Access, Check, Critical, NetSkope, Network, Point, Products, Trust, Uncovered, Vulnerabilities, Zscaler

Post navigation

Previous Post: Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada
Next Post: Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs

Related Posts

10 Best API Protection Tools in 2025 10 Best API Protection Tools in 2025 Cyber Security News
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Cyber Security News
Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 Cyber Security News
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News