PT-2025-33117 · Netskope · Netskope Client
Richard Warren
·
Published
2025-08-14
·
Updated
2025-12-25
·
CVE-2025-0309
CVSS v4.0
6.0
Medium
| AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
Netskope Client for Windows (affected versions not specified)
Description
An insufficient validation exists in the server connection endpoint of Netskope Client for Windows. This flaw allows local users to elevate their privileges on the system. The inadequate validation permits Netskope Client to establish connections with any server possessing publicly signed CA TLS certificates and transmit specifically crafted responses, leading to privilege escalation. The issue was discussed during a DEF CON #ZeroTrustTotalBust talk and a proof-of-concept (PoC) exploit has been released.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
LPE
Improper Certificate Validation
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Netskope Client