AmberWolf
@AmberWolfSec
Followers
431
Following
0
Media
7
Statuses
47
Offensive Cyber, Risk Management & Governance, Vulnerability Research and Technical Due Diligence
UK
Joined February 2024
A long time ago (wellโฆ last year), in a protocol handler not so far away, we showed how Delineaโs URL handler could be abused during update (CVE-2024-12908). Weโve now found a new path using msiexecโs PATCH to pull a remote MSP and execute code - even when the MSI is signed!
1
0
1
๐โจ The Saga Continues: MSI Strikes Back โจ๐ TL;DR: Bypass for CVE-2024-12908 - Code execution via Delinea's protocol handler is back. Patch now!
1
2
5
Netskope has not issued a CVE, noting only in release notes that a โ๐ด๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐จ๐ข๐ฑโ was fixed. Full technical details are on our blog: https://t.co/whdQdKrtOT
0
1
4
We also found all the credential material needed to exploit it available through OSINT, meaning the risk was not necessarily limited to other customers.
1
0
0
This flaw could allow an attacker in one organisation to bypass authentication and enrol users in another, gaining the same network access as the impersonated account.
1
0
0
As part of our ongoing ZTNA research series, we identified a cross-tenant authentication bypass in Netskope Secure Enrolment, disclosed on 14 March 2025 and patched in release R126 on 12 May 2025.
1
0
0
๐๐ฎ๐ฌ๐ญ ๐๐๐๐๐ฎ๐ฌ๐ ๐ข๐ญ ๐ฌ๐๐ฒ๐ฌ โ๐๐๐๐ฎ๐ซ๐โ ๐๐จ๐๐ฌ ๐ง๐จ๐ญ ๐ฆ๐๐๐ง ๐ข๐ญ ๐ข๐ฌ Authentication bypasses are not always just about going from unauthenticated to authenticated. What if other customers could gain access to your multi-tenant environment?
1
1
2
Netskope have released NSKPSA-2025-002 / CVE-2025-0309 for one of the privilege escalation vulnerabilities discussed during our #ZeroTrustTotalBust DEFCON talk Full writeup and PoC to follow on the @AmberWolfSec blog๐ https://t.co/wIrvDrb4gc
netskope.com
0
3
11
You can read about our overall research project at https://t.co/AEPWfEKwrZ and learn about a SAML Authentication bypass in Zscaler (CVE-2025-54982) at
blog.amberwolf.com
AmberWolf Security Research Blog
1
13
31
Our research uncovered critical flaws in these market leading solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, granting access internal resources as any user!
1
0
3
Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.
2
30
89
Maybe some info at #defcon33 on Saturday, Track 3, 15:30 "Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug"
not much info about it but: ๐ฅ CVE-2025-54982, CVSS: 9.6 (#Critical) Zscaler SAML Authentication A critical vulnerability due to improper verification of cryptographic signatures in Zscaler's SAML authentication mechanism, allowing authentication abuse. #CyberSecurity #CVE
0
8
8
If you want to understand why ZTNA solutions are not the answer to the problems highlighted by NachoVPN, you can attend our presentation, โZero Trust, Total Bust โ Breaking into thousands of cloud VPNs with one bugโ, at DEF CON on Saturday 9th August at 15:30, Track 3.
0
0
0
Read our blog post to learn more about the NachoVPN updates, the underlying bypasses and techniques that make obtaining SYSTEM shells possible, and how you can mitigate this in your environment.
1
0
0
โข Adds support for Impacket https://t.co/bXbLvxI27q, making it easier to serve payloads over the tunnel. โข Includes a bypass for CVE-2020-8241, allowing you, once again, to gain SYSTEM access using the Ivanti Connect Secure Client.
1
0
0
Today, we are releasing an update to NachoVPN that: โข Adds support for full VPN tunnelling and packet forwarding. This enables NachoVPN not only to behave like a VPN up to the point of connection, but to implement a fully functional VPN tunnel.
1
0
0
๐๐๐ฐ ๐๐ฅ๐จ๐ : ๐๐๐๐ก๐จ๐๐๐ โ ๐๐จ๐ฐ ๐๐ข๐ญ๐ก ๐๐จ๐ซ๐ ๐๐๐ (๐๐ง๐ ๐๐๐๐๐๐ ๐๐ก๐๐ฅ๐ฅ๐ฌ) Ahead of presenting our Zero Trust Network Access research at DEF CON 33, we thought it appropriate to release some updates to NachoVPN to keep SSL VPN enthusiasts happy.
1
3
2