Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise

    October 13, 2025

    Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

    October 13, 2025

    Gladinet file sharing zero-day brings patched flaw back from the dead

    October 13, 2025
    Facebook X (Twitter) Instagram
    Trending
    • I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise
    • Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
    • Gladinet file sharing zero-day brings patched flaw back from the dead
    • Buying an Android smartwatch? I found a model that’s highly functional and affordable
    • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
    • Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs
    • See It Here First at TechCrunch Disrupt 2025
    • Final Flash Sale: Save up to $624 on Disrupt 2025 Passes
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»DEF CON research takes aim at ZTNA, calls it a bust
    Security

    DEF CON research takes aim at ZTNA, calls it a bust

    TechurzBy TechurzAugust 13, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Shutterstock
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Major vendor vulnerabilities span authentication and design flaws

    The research exposed critical vulnerabilities across Check Point, Zscaler and Netskope that fell into three primary categories: authentication bypasses, credential storage failures and cross-tenant exploitation.

    Authentication bypass vulnerabilities

    Zscaler’s SAML implementation contained the most severe authentication flaw. The researchers discovered that the signature on the SAML assertion was only checked for presence, and it wasn’t validated against the identity provider’s public key. This allowed complete bypass of identity provider authentication by forging SAML responses with invalid signatures.

    Netskope suffered from a similar but more fundamental bypass. The enrollment API required no authentication, allowing attackers to register devices using only leaked organization keys and valid email addresses. 

    Check Point’s vulnerability centered on hard-coded encryption keys embedded in client binaries. These keys protected diagnostic log uploads containing JSON Web Tokens (JWTs) that lived for 30 days creating a potential compromise scenario for any customer who had uploaded logs to support.

    Credential storage and token management flaws

    All three vendors implemented weak credential storage mechanisms. Zscaler stored Device Token Authentication credentials in Windows registry in clear text, allowing local attackers to extract tokens and impersonate any user by modifying registry values. Netskope’s “Secure Enrollment” tokens used DPAPI encryption with insufficient protection.

    Vendor response and remediation

    Vendor responses varied significantly in speed and effectiveness. According to the researchers, Zscaler responded most rapidly, initially patching their SAML vulnerability (CVE-2025-54982) within four hours. However, the fix introduced compatibility issues requiring a rollback before a permanent solution was implemented.

    aim Bust Calls con DEF Research takes ZTNA
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleReport: iPhone 17 Air may have slower GPU speed than the rest of the iPhone 17 lineup
    Next Article The Simple Method I Use to Declutter Any Room in One Afternoon
    Techurz
    • Website

    Related Posts

    Security

    I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise

    October 13, 2025
    Security

    Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

    October 13, 2025
    Security

    Gladinet file sharing zero-day brings patched flaw back from the dead

    October 13, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise

    October 13, 2025

    Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

    October 13, 2025

    Gladinet file sharing zero-day brings patched flaw back from the dead

    October 13, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.