AmberWolfSec Profile Banner
AmberWolf Profile
AmberWolf

@AmberWolfSec

Followers
431
Following
0
Media
7
Statuses
47

Offensive Cyber, Risk Management & Governance, Vulnerability Research and Technical Due Diligence

UK
Joined February 2024
Don't wanna be here? Send us removal request.
@AmberWolfSec
AmberWolf
2 months
๐Ÿ‘‰ Full blog + demo:
blog.amberwolf.com
AmberWolf Security Research Blog
0
2
4
@AmberWolfSec
AmberWolf
2 months
A long time ago (wellโ€ฆ last year), in a protocol handler not so far away, we showed how Delineaโ€™s URL handler could be abused during update (CVE-2024-12908). Weโ€™ve now found a new path using msiexecโ€™s PATCH to pull a remote MSP and execute code - even when the MSI is signed!
1
0
1
@AmberWolfSec
AmberWolf
2 months
๐ŸŒŒโœจ The Saga Continues: MSI Strikes Back โœจ๐ŸŒŒ TL;DR: Bypass for CVE-2024-12908 - Code execution via Delinea's protocol handler is back. Patch now!
1
2
5
@AmberWolfSec
AmberWolf
3 months
Netskope has not issued a CVE, noting only in release notes that a โ€œ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜จ๐˜ข๐˜ฑโ€ was fixed. Full technical details are on our blog: https://t.co/whdQdKrtOT
0
1
4
@AmberWolfSec
AmberWolf
3 months
We also found all the credential material needed to exploit it available through OSINT, meaning the risk was not necessarily limited to other customers.
1
0
0
@AmberWolfSec
AmberWolf
3 months
This flaw could allow an attacker in one organisation to bypass authentication and enrol users in another, gaining the same network access as the impersonated account.
1
0
0
@AmberWolfSec
AmberWolf
3 months
As part of our ongoing ZTNA research series, we identified a cross-tenant authentication bypass in Netskope Secure Enrolment, disclosed on 14 March 2025 and patched in release R126 on 12 May 2025.
1
0
0
@AmberWolfSec
AmberWolf
3 months
๐‰๐ฎ๐ฌ๐ญ ๐›๐ž๐œ๐š๐ฎ๐ฌ๐ž ๐ข๐ญ ๐ฌ๐š๐ฒ๐ฌ โ€œ๐’๐ž๐œ๐ฎ๐ซ๐žโ€ ๐๐จ๐ž๐ฌ ๐ง๐จ๐ญ ๐ฆ๐ž๐š๐ง ๐ข๐ญ ๐ข๐ฌ Authentication bypasses are not always just about going from unauthenticated to authenticated. What if other customers could gain access to your multi-tenant environment?
1
1
2
@buffaloverflow
Rich Warren
3 months
Netskope have released NSKPSA-2025-002 / CVE-2025-0309 for one of the privilege escalation vulnerabilities discussed during our #ZeroTrustTotalBust DEFCON talk Full writeup and PoC to follow on the @AmberWolfSec blog๐Ÿ˜‰ https://t.co/wIrvDrb4gc
netskope.com
0
3
11
@AmberWolfSec
AmberWolf
3 months
2
4
13
@AmberWolfSec
AmberWolf
3 months
You can read about our overall research project at https://t.co/AEPWfEKwrZ and learn about a SAML Authentication bypass in Zscaler (CVE-2025-54982) at
blog.amberwolf.com
AmberWolf Security Research Blog
1
13
31
@AmberWolfSec
AmberWolf
3 months
Our research uncovered critical flaws in these market leading solutions, allowing attackers to escalate privileges on end user devices and to completely bypass authentication, granting access internal resources as any user!
1
0
3
@AmberWolfSec
AmberWolf
3 months
Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.
2
30
89
@AmberWolfSec
AmberWolf
3 months
Maybe some info at #defcon33 on Saturday, Track 3, 15:30 "Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug"
@UjlakiMarci
Marci Ujlaki
3 months
not much info about it but: ๐ŸŸฅ CVE-2025-54982, CVSS: 9.6 (#Critical) Zscaler SAML Authentication A critical vulnerability due to improper verification of cryptographic signatures in Zscaler's SAML authentication mechanism, allowing authentication abuse. #CyberSecurity #CVE
0
8
8
@AmberWolfSec
AmberWolf
3 months
If you want to understand why ZTNA solutions are not the answer to the problems highlighted by NachoVPN, you can attend our presentation, โ€œZero Trust, Total Bust โ€“ Breaking into thousands of cloud VPNs with one bugโ€, at DEF CON on Saturday 9th August at 15:30, Track 3.
0
0
0
@AmberWolfSec
AmberWolf
3 months
Read our blog post to learn more about the NachoVPN updates, the underlying bypasses and techniques that make obtaining SYSTEM shells possible, and how you can mitigate this in your environment.
1
0
0
@AmberWolfSec
AmberWolf
3 months
โ€ข Adds support for Impacket https://t.co/bXbLvxI27q, making it easier to serve payloads over the tunnel. โ€ข Includes a bypass for CVE-2020-8241, allowing you, once again, to gain SYSTEM access using the Ivanti Connect Secure Client.
1
0
0
@AmberWolfSec
AmberWolf
3 months
Today, we are releasing an update to NachoVPN that: โ€ข Adds support for full VPN tunnelling and packet forwarding. This enables NachoVPN not only to behave like a VPN up to the point of connection, but to implement a fully functional VPN tunnel.
1
0
0
@AmberWolfSec
AmberWolf
3 months
๐๐ž๐ฐ ๐๐ฅ๐จ๐ : ๐๐š๐œ๐ก๐จ๐•๐๐ โ€“ ๐๐จ๐ฐ ๐–๐ข๐ญ๐ก ๐Œ๐จ๐ซ๐ž ๐•๐๐ (๐€๐ง๐ ๐’๐˜๐’๐“๐„๐Œ ๐’๐ก๐ž๐ฅ๐ฅ๐ฌ) Ahead of presenting our Zero Trust Network Access research at DEF CON 33, we thought it appropriate to release some updates to NachoVPN to keep SSL VPN enthusiasts happy.
1
3
2