| Posted on: Thu, 06 Nov 2025 | |
| Chrome 142 “Local Network Access” prompt can block access to ZPA fixed IP range (100.64.0.0/10) Status: In Progress Event Type: Informational Status: Informational / Action Recommended Applies to: Zscaler Private Access (ZPA) What is changing? Google is enabling a new Local Network Access (LNA) permission in Chrome 142. When a web page (a public origin) tries to talk to something Chrome thinks is on the local / non-public network, Chrome will now show a banner like: “Look for and connect to any device on your local network?” If the user clicks Block, Chrome will stop that page from reaching the target. This is a browser change, not a Zscaler change. It is designed to reduce CSRF attacks against local devices and stop local-network fingerprinting. Chrome’s implementation considers requests from a public site to certain non-public address spaces as “local.” In our internal testing, requests destined for synthetic IP addresses used by ZPA 100.64.0.0/10 (RFC 6598 shared address space) can also hit this new prompt. If the user chooses Block, the browser will not complete the connection, and the ZPA application will fail to load, preventing access to private applications. Customer impact
Zscaler services/products impacted ZPA – private applications delivered via Zscaler that resolve or are reached over 100.64.0.0/10. Not impacted: ZIA, ZDX, and Internet-bound traffic are not affected by this Chrome feature. What Zscaler is doing Monitoring the Chrome 142 rollout and validating the exact address-space matching behavior for 100.64.0.0/10 across OS’s and managed/unmanaged Chrome. What customers should do now (action required)
FAQ Q: Why is Chrome treating 100.64.0.0/10 like it’s local? Because Chrome 142 is protecting any traffic it thinks is going to a non-public / non-Internet endpoint. ZPA intentionally uses an RFC 6598 shared address space (100.64.0.0/10) that isn’t routed on the Internet, so it ends up looking like a “local” destination to the browser. This is expected with LNA. Q: Can Zscaler bypass this in the cloud? No. This is enforced in the user’s browser before the request is sent. Only the browser (or the enterprise policy that manages it) can allow it. Zscaler will continue to deliver the app once the browser sends the traffic. Q: Is there a short-term workaround? Yes. Centrally allow the relevant origins; or instruct users to Allow; or (temporarily) stay on Chrome 141 while you roll out policy. Long-term, Google’s direction is clearly to keep LNA on. | |