Next, Next, SYSTEM: Exploiting NSIS installer bugs to escalate privileges in Zscaler Client Connector
Exploiting NSIS installer bugs to escalate privileges in Zscaler Client Connector
Read ArticleExploiting NSIS installer bugs to escalate privileges in Zscaler Client Connector
Read ArticleA bypass of the CVE-2025-0309 fix allowed enrolment to a rogue server via unauthenticated Netskope reverse-proxy routes.
Read ArticleSummary Ok, so there’s no MSI this time but our last Delinea post was titled ‘MSI Strikes Back’ so we thought we’d stay on …
Read ArticleCheck Point Harmony Local Privilege Escalation (CVE-2025-9142)
Read ArticleFootguns and privilege escalations making multi-tenancy difficult in Kubernetes clusters.
Read ArticleNever Trust, Always Verify - except when you have to trust the server isn’t malicious .. and install this CA certificate and MSI while …
Read ArticleIntroduction Delinea’s custom URL handler allows the software’s update process to be triggered, downloading and running an MSI from an …
Read ArticleAdvisory - Netskope Cross-tenant Authentication Bypass
Read ArticleAdvisory - Zscaler SAML Authentication Bypass (CVE-2025-549820)
Read ArticleUncovering critical flaws in ZTNA solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, …
Read ArticleThought CVE-2024-5921 was fixed? Nacho problem! NachoVPN brings downgrade attacks to GlobalProtect.
Read ArticleWhat’s better than logon scripts? SYSTEM shells. NachoVPN now abuses Ivanti remediation logic to load rogue DLLs over SMB and hijack Wow64 …
Read ArticleRecreating a vulnerability in log streaming via the Kubelet on Windows nodes
Read ArticleThe Delinea Protocol Handler suffers from a Remote Code Execution vulnerability in the sslauncher URL handler. This could be exploited by a malicious …
Read ArticleIs Your Corporate VPN Client Providing Access to More Than Just Your Employees?
Read ArticlePalo Alto GlobalProtect - RCE and Privilege Escalation via Malicious VPN Server (CVE-2024-5921)
Read ArticleSonicWall NetExtender for Windows - RCE as SYSTEM via EPC Client Update (CVE-2024-29014)
Read ArticleToday, we are releasing the details of CVE-2024-37404, a zero-day vulnerability in the Ivanti Connect Secure product. This vulnerability allows an …
Read ArticleJoin us as we reveal how CVE-2024-45488 can let attackers gain access to your corporate password vault and uncover hidden secrets of Microsoft DPAPI.
Read ArticleSafeGuard for Privileged Passwords (SPP) virtual appliance images contain a hard-coded cryptographic key (CWE-321). An attacker can exploit this key …
Read ArticleAs part of a recent client engagement, we conducted a product assessment of the Cato Client. During this assessment, we discovered significant …
Read ArticleThe Cato Client was found to store authentication data within the trace logs generated by the desktop client during SSO authentication.
Read ArticleThe OpenSSL implementation in the winvpnclient.cli.exe service executable is configured to load an openssl.cnf file from a location that does not …
Read ArticleThe Cato Client was found to use an insecure temporary folder for downloading and processing updates.
Read ArticleThe web service used during the Cato SSO authentication flow was found to contain an Open Redirect issue, which could allow a remote attacker to …
Read ArticleThe Cato Client suffers from a Remote Code Execution vulnerability which could be triggered via a URL handler, or via requests to the local webserver.
Read ArticleThe Cato Client allows a low-privileged, local user to install arbitrary Root CA Certificates in the computer’s certificate store.
Read Article