PT-2025-33117 · Netskope · Netskope Client

Richard Warren

·

Published

2025-08-14

·

Updated

2025-12-25

·

CVE-2025-0309

CVSS v4.0

6.0

Medium

AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Name of the Vulnerable Software and Affected Versions Netskope Client for Windows (affected versions not specified)
Description An insufficient validation exists in the server connection endpoint of Netskope Client for Windows. This flaw allows local users to elevate their privileges on the system. The inadequate validation permits Netskope Client to establish connections with any server possessing publicly signed CA TLS certificates and transmit specifically crafted responses, leading to privilege escalation. The issue was discussed during a DEF CON #ZeroTrustTotalBust talk and a proof-of-concept (PoC) exploit has been released.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

LPE

Improper Certificate Validation

Weakness Enumeration

Related Identifiers

CVE-2025-0309

Affected Products

Netskope Client