We’re aware of a global issue impacting multiple Microsoft 365 services, which may result in degraded functionality or an inability to access certain features for some schools. Microsoft has confirmed that recovery efforts are underway and they are currently refining...
Advisory: Getting ready for the new year: Secure Access device enrolment tips
As we head into a new school year, we want to help you get your school’s unmanaged and personal devices ready for the N4L Secure Access network. Prerequisite: ensure a smooth transition, please note that a school Google or Entra ID account is required for...
Advisory: Lumma Stealer malware
We're aware that Lumma Stealer malware has affected some New Zealanders’ online accounts, as reported by the NCSC. We are monitoring the situation and will contact you directly if we see anything suspicious. Find out more and their recommendations via the NCSC alert -...
Ruckus Cloudpath upgrade to version 6.0R3
We’d like to notify you of the upcoming Ruckus Cloudpath upgrade to version 6.0R3. It will be carried out in 5 stages: on 19, 20, 21, 22 and 23 January (4pm to 11:30pm) and we’re contacting all affected schools that have completed Equipment Replacement directly with...
Update: Web Filtering not impacted by Encrypted Client Hello
Updated 6 June 2025, 2pm: We’ve disabled Encrypted Client Hello on our network. This means that N4L’s Web Filtering should work as expected for all websites accessed on school networks, allowing or blocking websites according to each school’s Web Filtering settings....
N4L is now managing the Education Service Desk
The Education Service Desk, who manage enquiries for a range of applications used by schools and the wider education sector (such as Education Sector Logon and e-asTTle), has transferred from the Ministry of Education to N4L. There’s no disruption or change to the...
Advisory: vulnerability affecting PHP on Windows (CVE-2024-4577)
We’re aware of a vulnerability impacting Windows users. CVE-2024-4577 is a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows. Successful exploitation enables unauthenticated attackers to execute arbitrary code and can lead to complete...
Phishing email scam circulating in some schools
We’re aware of a phishing scam circulating via email in some schools. You can see an example of what this email looks like below. The phishing email is crafted to appear legitimate, being sent from legitimate email addresses of schools and other New Zealand...
FortiClient Remote Access vulnerability
We’re aware of a Cleartext Storage of Sensitive Information vulnerability impacting FortiClient, a remote access solution used by some schools. The vulnerability impacts users on Windows and Linux devices that have updated FortiClient to version 7 (full list of...
Authentication bypass vulnerability impacting FortiOS and FortiProxy (CVE-2024-55591)
We’re aware of an authentication bypass vulnerability affecting ForitOS and FortiProxy. Attackers are exploiting this vulnerability by sending a specially crafted request to the administrative interface of firewalls. All N4L-managed firewall administrative interfaces...