Security researchers from AmberWolf have uncovered multiple critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions offered by Zscaler, Netskope, and Check Point (Perimeter 81). The findings, presented at DEF CON 33, highlight severe authentication bypasses and privilege escalation flaws that could allow attackers to gain unauthorized access to corporate systems. Among the most serious issues is a SAML authentication bypass in Zscaler (CVE-2025-54982), hard-coded SFTP credentials in Check Point’s Perimeter 81, and multiple authentication and impersonation flaws in Netskope's client. These vulnerabilities threaten thousands of organizations relying on these platforms for secure remote access. The research emphasizes how these flaws strike at the core of ZTNA security, undermining trust-based access models. Unlike traditional VPN vulnerabilities, these issues directly impact the authentication and identity verification layers, allowing attackers to impersonate users across different organizations. Worryingly, Netskope continues to support an authentication method known to be vulnerable, despite having public documentation acknowledging its exploitability. The lack of consistent vulnerability disclosure—such as Netskope not issuing CVEs for certain server-side flaws—further complicates organizations' efforts to assess and mitigate risk. To safeguard systems, organizations using these platforms should immediately review vendor advisories, apply available patches, and audit their ZTNA configurations for insecure settings. Security teams should disable deprecated or vulnerable authentication methods and implement strict identity validation practices. Regular third-party security assessments and adopting a layered security approach can help ensure these critical tools are not single points of failure. Vendor transparency and prompt response to disclosures are essential to maintaining trust in Zero Trust systems.
Threat actors are abusing comments on Pastebin to promote a new ClickFix style scam targeting cryptocurrency users.The campaign lures victims with promises of large profits from a ...
Security researchers have identified a new cross-platform remote access trojan (RAT), dubbed ZeroDayRAT, actively targeting both Android and iOS devices. The malware is designed to...
Security researchers have identified critical vulnerabilities in websites running the Novarain/Tassos Framework (plg_system_nrframework), exposing them to unauthenticated file read...