HomeVulnerabilityDEF CON analysis takes goal at ZTNA, calls it a bust

DEF CON analysis takes goal at ZTNA, calls it a bust

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Examine Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained probably the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from the same however extra elementary bypass. The enrollment API required no authentication, permitting attackers to register units utilizing solely leaked group keys and legitimate e-mail addresses. 

Examine Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Net Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to assist.

See also  High 7 zero-day exploitation traits of 2024

Credential storage and token administration flaws

All three distributors carried out weak credential storage mechanisms. Zscaler saved System Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses assorted considerably in velocity and effectiveness. Based on the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was carried out.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular