Description
Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.
Published: 2024-08-26
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Netskope has fixed the gap and recommends customers to review their deployments of Netskope Client and enable the fix in their tenants. Here is the detailed guide - https://docs.netskope.com/en/secure-enrollment/


Vendor Workaround

There is no countermeasure available to remediate the gap without enabling Secure Enrollment, but follow the below steps to minimize the risk: * Enable device compliance and device classification * Create a policy to block all traffic for the devices which are not meeting the device compliance checks and are not falling under proper device classification.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-48332 Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.
History

Wed, 23 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:H/SI:H/SA:L'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:H/SI:H/SA:L/AU:Y/U:Red'}


Thu, 05 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Netskope
Netskope netskope
CPEs cpe:2.3:a:netskope:netskope:*:*:*:*:*:*:*:*
Vendors & Products Netskope
Netskope netskope
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Wed, 28 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
Description Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user. Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.

Mon, 26 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Aug 2024 16:45:00 +0000

Type Values Removed Values Added
Description Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.
Title Client Enrollment Process Bypass
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:H/SI:H/SA:L'}


Subscriptions

Netskope Netskope
cve-icon MITRE

Status: PUBLISHED

Assigner: Netskope

Published:

Updated: 2025-07-23T11:02:11.214Z

Reserved: 2024-08-02T07:20:21.411Z

Link: CVE-2024-7401

cve-icon Vulnrichment

Updated: 2024-08-26T17:34:39.297Z

cve-icon NVD

Status : Modified

Published: 2024-08-26T17:15:06.987

Modified: 2025-07-23T11:15:32.100

Link: CVE-2024-7401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses