Security researchers from AmberWolf have uncovered multiple critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions offered by Zscaler, Netskope, and Check Point (Perimeter 81). The findings, presented at DEF CON 33, highlight severe authentication bypasses and privilege escalation flaws that could allow attackers to gain unauthorized access to corporate systems. Among the most serious issues is a SAML authentication bypass in Zscaler (CVE-2025-54982), hard-coded SFTP credentials in Check Point’s Perimeter 81, and multiple authentication and impersonation flaws in Netskope's client. These vulnerabilities threaten thousands of organizations relying on these platforms for secure remote access. The research emphasizes how these flaws strike at the core of ZTNA security, undermining trust-based access models. Unlike traditional VPN vulnerabilities, these issues directly impact the authentication and identity verification layers, allowing attackers to impersonate users across different organizations. Worryingly, Netskope continues to support an authentication method known to be vulnerable, despite having public documentation acknowledging its exploitability. The lack of consistent vulnerability disclosure—such as Netskope not issuing CVEs for certain server-side flaws—further complicates organizations' efforts to assess and mitigate risk. To safeguard systems, organizations using these platforms should immediately review vendor advisories, apply available patches, and audit their ZTNA configurations for insecure settings. Security teams should disable deprecated or vulnerable authentication methods and implement strict identity validation practices. Regular third-party security assessments and adopting a layered security approach can help ensure these critical tools are not single points of failure. Vendor transparency and prompt response to disclosures are essential to maintaining trust in Zero Trust systems.
A critical supply chain attack recently targeted the xygeni-action GitHub Action, exploiting a technique known as tag poisoning to compromise trusted CI/CD workflows. The vulnerabi...
Researchers have uncovered a new ClickFix-driven social engineering campaign specifically targeting macOS users. The attack tricks victims into manually executing malicious Termina...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution vulnerability affecting the open-source workflow automation platform n8n...