Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope

Posted on August 11, 2025August 11, 2025 By CWS

Essential cybersecurity vulnerabilities have been recognized in enterprise-level Zero Belief Community Entry options, probably enabling malicious actors to breach company networks with relative ease.

AmberWolf safety researchers unveiled these vulnerabilities throughout their DEF CON 33 presentation, demonstrating how attackers can exploit authentication weaknesses in merchandise from trade leaders Zscaler, NetSkope, and Verify Level to achieve unauthorized entry to delicate inner techniques and escalate privileges on endpoint units.

Key Takeaways1. Essential flaws in Zscaler, NetSkope, and Verify Level permit attackers to bypass authentication.2. Allow SYSTEM-level entry and cross-tenant knowledge publicity.3. Unpatched flaws exploited within the wild for 16+ months.

Authentication Bypass Vulnerabilities

Essentially the most extreme findings embody a number of authentication bypass vulnerabilities that permit attackers to impersonate reputable customers with out correct credentials. 

In Zscaler’s implementation, researchers found a SAML authentication bypass tracked as CVE-2025-54982, the place the platform didn’t validate that SAML assertions have been appropriately signed. 

This flaw permits full authentication bypass, granting entry to each net proxies and “Non-public Entry” companies that route site visitors to inner company assets.

NetSkope’s vulnerabilities proved equally regarding, with researchers figuring out an authentication bypass in Id Supplier (IdP) enrollment mode that was beforehand documented as CVE-2024-7401. 

The corporate’s personal safety advisory acknowledges in-the-wild exploitation by bug bounty hunters, but many organizations proceed utilizing this insecure configuration 16 months after preliminary disclosure. 

Moreover, NetSkope suffers from arbitrary cross-organization consumer impersonation when attackers possess a non-revocable “OrgKey” worth alongside any enrollment key, enabling full authentication bypass throughout completely different tenants.

Privilege Escalation and Cross-Tenant Information Publicity

Past authentication bypasses, the analysis revealed privilege escalation vulnerabilities that might compromise endpoint safety. 

NetSkope’s shopper comprises a neighborhood privilege escalation flaw, permitting attackers to realize SYSTEM-level entry by coercing the shopper to speak with a rogue server. 

This vulnerability, presently pending CVE task, demonstrates how ZTNA shoppers can develop into assault vectors for native system compromise, reads the AmberWolf report.

Verify Level’s Perimeter 81 service uncovered a hard-coded SFTP key vulnerability, offering unauthorized entry to an SFTP server containing shopper logs from a number of tenants. 

These logs embody JWT materials that might facilitate authentication in opposition to the Perimeter 81 service, representing a major cross-tenant knowledge publicity danger.

As organizations more and more undertake ZTNA options to interchange conventional VPNs, these discoveries underscore the significance of rigorous safety validation and vendor accountability in defending company community infrastructure from subtle menace actors.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Access, Check, Critical, NetSkope, Network, Point, Products, Trust, Uncovered, Vulnerabilities, Zscaler

Post navigation

Previous Post: Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada
Next Post: Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs

Related Posts

Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News
Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News