Vulnerability Description
Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netskope | Netskope | All versions |
Related Weaknesses (CWE)
References
- https://docs.netskope.com/en/secure-enrollment/Product
- https://quickskope.com/
- https://www.netskope.com/company/security-compliance-and-assurance/security-adviVendor Advisory
FAQ
What is CVE-2024-7401?
CVE-2024-7401 is a vulnerability with a CVSS score of 7.5 (HIGH). Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, c...
How severe is CVE-2024-7401?
CVE-2024-7401 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7401?
Check the references section above for vendor advisories and patch information. Affected products include: Netskope Netskope.