Security Gap Discovered in Netskope Client Enrollment Process
CVE-2024-7401

8.5HIGH

Key Information:

Vendor

Netskope

Vendor
CVE Published:
26 August 2024

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2024-7401?

Netskope has identified a significant security vulnerability in the enrollment process of its Netskope Client. This issue arises from the reliance on a static token, referred to as 'Orgkey', for authentication. Due to the static nature of this token, it becomes a single point of failure; if compromised, it cannot be rotated or revoked, creating an opportunity for malicious actors. By exploiting this vulnerability, an attacker can enroll an unauthorized NSClient from a customer's tenant, effectively impersonating a legitimate user and gaining potentially unauthorized access to sensitive resources. Organizations using the affected versions of Netskope Client are urged to stay informed about this security concern and take necessary measures to mitigate potential risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Netskope Client All

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐ŸŸก

    Public PoC available

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sander di Wit
.