netskope CVE Vulnerabilities & Metrics

Focus on netskope vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About netskope Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with netskope. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total netskope CVEs: 10
Earliest CVE date: 26 Sep 2019, 16:15 UTC
Latest CVE date: 26 Aug 2024, 17:15 UTC

Latest CVE reference: CVE-2024-7401

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -66.67%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -66.67%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical netskope CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.99

Max CVSS: 9.3

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 0
7.0-8.9 3
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS netskope CVEs

These are the five CVEs with the highest CVSS scores for netskope, sorted by severity first and recency.

All CVEs for netskope

CVE-2024-7401 netskope vulnerability CVSS: 0 26 Aug 2024, 17:15 UTC

Netskope was notified about a security gap in Netskope Client enrollment process where NSClient is using a static token “Orgkey” as authentication parameter. Since this is a static token, if leaked, cannot be rotated or revoked. A malicious actor can use this token to enroll NSClient from a customer’s tenant and impersonate a user.

CVE-2023-4996 netskope vulnerability CVSS: 0 06 Nov 2023, 11:15 UTC

Netskope was made aware of a security vulnerability in its NSClient product for version 100 & prior where a malicious non-admin user can disable the Netskope client by using a specially-crafted package. The root cause of the problem was a user control code when called by a Windows ServiceController did not validate the permissions associated with the user before executing the user control code. This user control code had permissions to terminate the NSClient service. 

CVE-2022-4149 netskope vulnerability CVSS: 0 15 Jun 2023, 07:15 UTC

The Netskope client service (prior to R96) on Windows runs as NT AUTHORITY\SYSTEM which writes log files to a writable directory (C:\Users\Public\netSkope) for a standard user. The files are created and written with a SYSTEM account except one file (logplaceholder) which inherits permission giving all users full access control list. Netskope client restricts access to this file by allowing only read permissions as a standard user. Whenever the Netskope client service restarts, it deletes the logplaceholder and recreates, creating a race condition, which can be exploited by a malicious local user to create the file and set ACL permissions on the file. Once the file is created by a malicious user with proper ACL permissions, all files within C:\Users\Public\netSkope\ becomes modifiable by the unprivileged user. By using Windows pseudo-symlink, these files can be pointed to other places in the system and thus malicious users will be able to elevate privileges.

CVE-2023-2270 netskope vulnerability CVSS: 0 15 Jun 2023, 05:15 UTC

The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.

CVE-2021-44862 netskope vulnerability CVSS: 0 03 Nov 2022, 20:15 UTC

Netskope client is impacted by a vulnerability where an authenticated, local attacker can view sensitive information stored in NSClient logs which should be restricted. The vulnerability exists because the sensitive information is not masked/scrubbed before writing in the logs. A malicious user can use the sensitive information to download data and impersonate another user.

CVE-2021-41388 netskope vulnerability CVSS: 7.2 04 Jan 2022, 22:15 UTC

Netskope client prior to 89.x on macOS is impacted by a local privilege escalation vulnerability. The XPC implementation of nsAuxiliarySvc process does not perform validation on new connections before accepting the connection. Thus any low privileged user can connect and call external methods defined in XPC service as root, elevating their privilege to the highest level.

CVE-2020-24576 netskope vulnerability CVSS: 9.0 12 Aug 2021, 11:15 UTC

Netskope Client through 77 allows low-privileged users to elevate their privileges to NT AUTHORITY\SYSTEM.

CVE-2020-28845 netskope vulnerability CVSS: 9.3 20 Nov 2020, 20:15 UTC

A CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.

CVE-2019-12091 netskope vulnerability CVSS: 7.2 26 Sep 2019, 16:15 UTC

The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from command injection vulnerability. Local users can use this vulnerability to execute code with NT\SYSTEM privilege.

CVE-2019-10882 netskope vulnerability CVSS: 7.2 26 Sep 2019, 16:15 UTC

The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.