Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-15584
PUBLISHED
More InfoOfficial Page
Assigner-Netskope
Assigner Org ID-bf992f6a-e49d-4e94-9479-c4cff32c62bc
View Known Exploited Vulnerability (KEV) details
Published At-17 Mar, 2026 | 18:55
Updated At-18 Mar, 2026 | 14:04
Rejected At-
▼CVE Numbering Authority (CNA)
Endpoint DLP Driver Filter Communication Port Integer Overflow

Netskope was notified about a potential gap in its Endpoint DLP Module for Netskope Client on Windows systems. The successful exploitation of the gap can potentially allow an unprivileged user to trigger an integer overflow within the filter communication port, leading to a Blue-Screen-of-Death (BSOD). Successful exploitation would require the Endpoint DLP module to be enabled in the client configuration. A successful exploit can potentially result in a denial-of-service for the local machine.

Affected Products
Vendor
Netskope
Product
Endpoint DLP Module for Netskope Client
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From 0 before 135.0.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190 Integer overflow or wraparound
Type: CWE
CWE ID: CWE-190
Description: CWE-190 Integer overflow or wraparound
Metrics
VersionBase scoreBase severityVector
4.06.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-92CAPEC-92 Forced Integer Overflow
CAPEC ID: CAPEC-92
Description: CAPEC-92 Forced Integer Overflow
Solutions

Configurations

Requires the Endpoint DLP module to be enabled in the client configuration.

Workarounds

There are no direct workarounds. Some AV and EDR solutions may be able to detect the behaviors associated with exploiting this vulnerability.

Exploits

Credits

reporter
Tom Brice
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.netskope.com/s/article/NSKPSA-2025-006-Endpoint-DLP-Driver-Filter-Communication-Port-Integer-Overflow
vendor-advisory
permissions-required
Hyperlink: https://support.netskope.com/s/article/NSKPSA-2025-006-Endpoint-DLP-Driver-Filter-Communication-Port-Integer-Overflow
Resource:
vendor-advisory
permissions-required
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found