Thursday, 16 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > DEF CON research takes aim at ZTNA, calls it a bust
Global Market

DEF CON research takes aim at ZTNA, calls it a bust

Last updated: August 18, 2025 6:45 am
Published August 18, 2025
Share
Shutterstock
SHARE

Main vendor vulnerabilities span authentication and design flaws

The analysis uncovered essential vulnerabilities throughout Verify Level, Zscaler and Netskope that fell into three main classes: authentication bypasses, credential storage failures and cross-tenant exploitation.

Authentication bypass vulnerabilities

Zscaler’s SAML implementation contained essentially the most extreme authentication flaw. The researchers found that the signature on the SAML assertion was solely checked for presence, and it wasn’t validated in opposition to the identification supplier’s public key. This allowed full bypass of identification supplier authentication by forging SAML responses with invalid signatures.

Netskope suffered from an identical however extra basic bypass. The enrollment API required no authentication, permitting attackers to register gadgets utilizing solely leaked group keys and legitimate electronic mail addresses. 

Verify Level’s vulnerability centered on hard-coded encryption keys embedded in consumer binaries. These keys protected diagnostic log uploads containing JSON Internet Tokens (JWTs) that lived for 30 days creating a possible compromise situation for any buyer who had uploaded logs to help.

Credential storage and token administration flaws

All three distributors applied weak credential storage mechanisms. Zscaler saved Machine Token Authentication credentials in Home windows registry in clear textual content, permitting native attackers to extract tokens and impersonate any consumer by modifying registry values. Netskope’s “Safe Enrollment” tokens used DPAPI encryption with inadequate safety.

Vendor response and remediation

Vendor responses different considerably in velocity and effectiveness. In line with the researchers, Zscaler responded most quickly, initially patching their SAML vulnerability (CVE-2025-54982) inside 4 hours. Nevertheless, the repair launched compatibility points requiring a rollback earlier than a everlasting answer was applied.

See also  Pres. Biden calls to ban AI voice impersonation in SOTU

Source link

TAGGED: Aim, bust, calls, Con, Def, Research, Takes, ZTNA
Share This Article
Twitter Email Copy Link Print
Previous Article Salesforce's new CoAct-1 write their own code to accomplish tasks Salesforce’s new CoAct-1 write their own code to accomplish tasks
Next Article The evolution of data center semiconductors: Navigating the AI revolution The evolution of data center semiconductors: Navigating the AI revolution
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Velox Raises $38M in Funding Led by Fortissimo Capital

Co-founders (L-R) Marian Cofler (CEO) and Adrian Cofler (COO) Velox, a Kfar Saba, Israel-based developer,…

April 8, 2024

Digital Realty completes full $6.0 billion Green Bond Allocation

The inexperienced bond choices have performed an important function in supporting sustainable actions throughout 130…

March 14, 2024

Cisco Zero-Day Under Fire From Threat Group

This article originally appeared in Dark Reading.Cisco has patched a command-line injection flaw in a community…

July 3, 2024

DataVita achieves ‘gold standard’ OCP status

Scotland’s main supplier of important digital infrastructure has secured the Open Compute Challenge’s (OCP) Prepared…

April 17, 2025

Digital Realty Lands in Crete, Powering Med’s Digital Future

Digital Realty, a world provider of colocation, interconnection, and cloud-and carrier-neutral knowledge middle options, introduced…

April 9, 2025

You Might Also Like

Spending on AI-enabled security tools
Global Market

IBM unveils security services for thwarting agentic attacks, automating threat assessment

By saad
Allbirds swaps shoes for AI infrastructure
Global Market

Allbirds swaps shoes for AI infrastructure

By saad
AI services
Global Market

Maine to put brakes on big data centers as AI expansion collides with power limits

By saad
OpenAI
Global Market

OpenAI pulls out of a second Stargate data center deal

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.