Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Def Con Research Targets on Ztna, calls it a bust
    Security

    Def Con Research Targets on Ztna, calls it a bust

    PineapplesUpdateBy PineapplesUpdateAugust 13, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Def Con Research Targets on Ztna, calls it a bust
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Def Con Research Targets on Ztna, calls it a bust

    Major sellers extend the weaknesses authentication and design defects

    Research highlighted significant weaknesses in Czech Point, ZSCAler and Netskope that fell into three primary categories: authentication bypass, credential storage failures and cross-tenant exploitation.

    Certification bypass vulnerability

    The most severe certification in the SAML implementation of Zscler was the defect. Researchers found that the SAML claim was signed only for appearance, and it was not valid against the public key of the identity provider. This allowed a complete bypass of identification provider authentication by creating SAML reactions with invalid signatures.

    Netscope was uniform but suffering from more original bypass. The enrollment API did not require any authentication, allowing the attackers to register equipment only using leaked organizations and valid email addresses.

    The vulnerability of a check point focused on the hard-coded encryption keys embedded in client binergies. These keys protected the diagnostic log upload containing JSON web tokens (JWTS), creating a possible compromise landscape for any customer for 30 days, which uploaded the log for support.

    Credential Storage and Token Management Falls

    All three vendors implemented weak credentials storage mechanisms. In a clear text in the ZSCAler stored device token certification credentials in Windows Registry, local attackers allow the registry values to allow any user to extract and replicate tokens. The “safe enrollment” token of the Netscope used DPAPI encryption with insufficient security.

    Seller reaction and treatment

    Seller reactions vary greatly in speed and effectiveness. According to the researchers, Zscaler responded the fastest, initially patching his Saml vulnerability (CVE-2025-54982) within four hours. However, Fix introduced compatibility issues requiring a rollback before a permanent solution was implemented.

    bust calls con Def Research Targets Ztna
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticlePost Quantum Cryptography urgency
    Next Article India’s Rapido started testing food distribution to take Swiggy, Zomato
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Meet Denario, the AI ​​’research assistant’ who’s already publishing his own papers

    November 4, 2025
    Startups

    This simple Pixel update finally makes my Android calls as good as the iPhone’s

    October 30, 2025
    AI/ML

    Quen’s new Deep Research update lets you turn its reports into webpages, podcasts in seconds

    October 21, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.