Tuesday, 21 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > DEF CON research takes aim at ZTNA, calls it a bust
Global Market

DEF CON research takes aim at ZTNA, calls it a bust

Last updated: August 18, 2025 6:45 am
Published August 18, 2025
Share
Shutterstock
SHARE

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Verify Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained essentially the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from an identical however extra basic bypass. The enrollment API required no authentication, permitting attackers to register gadgets utilizing solely leaked group keys and legitimate electronic mail addresses. 

Verify Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Internet Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to help.

Credential storage and token administration flaws

All three distributors applied weak credential storage mechanisms. Zscaler saved Machine Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses different considerably in velocity and effectiveness. In line with the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was applied.

See also  Optical networking challenges gain attention as AI networking demands rise

Source link

TAGGED: Aim, bust, calls, Con, Def, Research, Takes, ZTNA
Share This Article
Twitter Email Copy Link Print
Previous Article Salesforce's new CoAct-1 write their own code to accomplish tasks Salesforce’s new CoAct-1 write their own code to accomplish tasks
Next Article The evolution of data center semiconductors: Navigating the AI revolution The evolution of data center semiconductors: Navigating the AI revolution
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Carbon3.ai launches NVIDIA Blackwell Ultra AI

Carbon3.ai has deployed NVIDIA Blackwell Extremely AI infrastructure built-in with HPE direct liquid cooling (DLC)…

December 18, 2025

Is your ‘diverse’ network actually one fibre cut away from failure?

Tristan Wooden, Managing Director at Livewire Digital, argues that resilience is being undermined by hidden…

March 25, 2026

Walkthrough screening system enhances security at airports nationwide

Lincoln Laboratory's microwave imaging know-how was licensed by Liberty Protection, who developed the HEXWAVE safety…

October 19, 2025

Gemini 3 Flash arrives with reduced costs and latency — a powerful combo for enterprises

Enterprises can now harness the ability of a giant language mannequin that is close to…

December 18, 2025

Google advances mobile AI in Pixel 9 smartphones

Google has unveiled its new vary of Pixel 9 smartphones, emphasising their enhanced AI capabilities.…

August 15, 2024

You Might Also Like

Propelling manufacturing, aerospace and defence innovation through applied research
Innovations

Propelling manufacturing, aerospace and defence innovation through applied research

By saad
Wireless router generic image
Global Market

AI fuels wireless talent shortage

By saad
AI agent consuming and using enterprise data in retail-as-a-service application.
Global Market

Cloudflare wants to rebuild the network for the age of AI agents

By saad
Why physical security needs a bigger role
Global Market

Why physical security needs a bigger role

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.