Description
The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
References (3)
Core 3
Core References
Permissions Required, Release Notes, Vendor Advisory x_refsource_confirm
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf
Permissions Required, Vendor Advisory x_refsource_confirm
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client
Third Party Advisory x_refsource_misc
https://airbus-seclab.github.io/advisories/netskope.html
Scores
CVSS v3
7.8
EPSS
0.0005
EPSS Percentile
14.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
CWE-787
Status
published
Products (1)
netskope/netskope
57 - 57.2.0.219
Published
Sep 26, 2019
Tracked Since
Feb 18, 2026