Vulnerabilites related to zscaler - client_connector
Vulnerability from fkie_nvd
Published
2024-05-06 19:15
Modified
2025-01-15 16:50
Severity ?
7.6 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
7.6 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
7.6 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Summary
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*", "matchCriteriaId": "F0918F54-0052-42BD-A73E-CFF198B9EC48", "versionEndExcluding": "7.2.5", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", "matchCriteriaId": "81B7F626-84B5-47A5-959F-735D6250C147", "versionEndExcluding": "7.2.5", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5E714EAF-73AB-41EA-AC57-E59B78FD7853", "versionEndExcluding": "7.2.5", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:linux:*:*", "matchCriteriaId": "7B728862-1FAB-47B4-823D-2C19CBF76DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:macos:*:*", "matchCriteriaId": "0A079CA4-D957-402A-B899-31F26A89DF00", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*", "matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:anyconnect_vpn_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "59289E79-5A0A-4675-B7D4-C759401736A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE81F5D2-269B-4098-AA9F-2DBCA3CB8813", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8EEBB31D-BC9C-4EAD-86B1-8B95AB118A2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "4814D5DB-A96C-4D91-9DAE-87FF0DA101D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "72F88FEB-766B-4FCD-B78E-0E8E5E2B5CCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D5537140-CDA3-4410-B101-24D1AB3624EA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB344FC1-AD7C-4988-A703-8B2CD0AEF57C", "versionEndExcluding": "24.06.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "697D4070-101A-45B1-99B1-F33ECF03945C", "versionEndExcluding": "24.8.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB16CE4D-183C-44B9-A5FF-6F9FA3C0A618", "versionEndIncluding": "7.2.5", "versionStartIncluding": "7.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A7F605E-EB10-40FB-98D6-7E3A95E310BC", "versionEndIncluding": "15.1.10", "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8FEC1DE-D11F-4DC8-8B21-51BAF1731A5F", "versionEndIncluding": "16.1.5", "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DE3A941-B898-4EAB-9073-C6A312E59FC5", "versionEndIncluding": "17.1.2", "versionStartIncluding": "17.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:watchguard:ipsec_mobile_vpn_client:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FFB4A7FD-AC96-490D-9CBB-72166D46C4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:watchguard:ipsec_mobile_vpn_client:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2EAD2DBA-3038-4EF8-8BAE-80BD3DA97B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:macos:*:*", "matchCriteriaId": "AB8A39F6-8AD5-4B9D-92E4-7E28EE78C5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0AF97158-6BB8-47CA-8214-98D2F801C8BA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "1F206869-8FCE-40AE-ADDC-62F221E00004", "versionEndExcluding": "1.5.1.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "7D37D825-E2B8-4924-AA8A-ACB0E08A3C61", "versionEndExcluding": "4.2.0.282", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "4EC77FDF-1E1A-4638-9C9F-DA4205FDD69B", "versionEndExcluding": "3.7.0.134", "versionStartIncluding": "3.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:-:*:*:*:*:windows:*:*", "matchCriteriaId": "C057E1BC-C7BA-4EAF-8200-560035118FA0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DHCP can add routes to a client\u2019s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN." }, { "lang": "es", "value": "Por dise\u00f1o, el protocolo DHCP no autentica mensajes, incluida, por ejemplo, la opci\u00f3n de ruta est\u00e1tica sin clases (121). Un atacante con la capacidad de enviar mensajes DHCP puede manipular rutas para redirigir el tr\u00e1fico VPN, lo que le permite leer, interrumpir o posiblemente modificar el tr\u00e1fico de red que se esperaba que estuviera protegido por la VPN. Muchos, si no la mayor\u00eda, de los sistemas VPN basados en enrutamiento IP son susceptibles a este tipo de ataques." } ], "id": "CVE-2024-3661", "lastModified": "2025-01-15T16:50:28.667", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-06T19:15:11.027", "references": [ { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://bst.cisco.com/quickview/bug/CSCwk05814" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Related" ], "url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Related" ], "url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Issue Tracking" ], "url": "https://issuetracker.google.com/issues/263721377" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Press/Media Coverage" ], "url": "https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Issue Tracking" ], "url": "https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Third Party Advisory" ], "url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K000139553" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=40279632" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=40284111" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-3661" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tunnelvisionbug.com/" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Related" ], "url": "https://www.agwa.name/blog/post/hardening_openvpn_for_def_con" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Third Party Advisory" ], "url": "https://www.leviathansecurity.com/research/tunnelvision" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Press/Media Coverage" ], "url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bst.cisco.com/quickview/bug/CSCwk05814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Related" ], "url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Related" ], "url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://issuetracker.google.com/issues/263721377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage" ], "url": "https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://my.f5.com/manage/s/article/K000139553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=40279632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=40284111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-3661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tunnelvisionbug.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Related" ], "url": "https://www.agwa.name/blog/post/hardening_openvpn_for_def_con" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.leviathansecurity.com/research/tunnelvision" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage" ], "url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability" } ], "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" }, { "lang": "en", "value": "CWE-501" } ], "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 05:56
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Summary
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8318DD99-D4B2-4917-AAB3-56D65DE97B57", "versionEndExcluding": "3.4.0.124", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.\n\n\n\n\n\n" }, { "lang": "es", "value": "El instalador de Zscaler Client Connector en Windows anterior a la versi\u00f3n 3.4.0.124 manejaba incorrectamente las uniones de directorios durante la desinstalaci\u00f3n. Un adversario local puede eliminar carpetas en un contexto elevado." } ], "id": "CVE-2021-26734", "lastModified": "2024-11-21T05:56:46.477", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:08.927", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 05:56
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3A7E628-F74C-46BC-A5E5-25402F2B90D8", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n\n\n\n" }, { "lang": "es", "value": "Zscaler Client Connector Installer and Unsintallers para Windows anteriores a 3.6 ten\u00edan una vulnerabilidad de ruta de b\u00fasqueda sin comillas. Un adversario local puede ejecutar c\u00f3digo con privilegios de SYSTEM." } ], "id": "CVE-2021-26735", "lastModified": "2024-11-21T05:56:46.610", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.000", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322", "versionEndExcluding": "1.3.1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n\n" }, { "lang": "es", "value": "La vulnerabilidad de error de validaci\u00f3n de origen en Zscaler Client Connector en Linux permite la inclusi\u00f3n de c\u00f3digo en el proceso existente. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6." } ], "id": "CVE-2023-28795", "lastModified": "2024-11-21T07:56:01.720", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.450", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-22 20:15
Modified
2024-11-21 07:56
Severity ?
8.2 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "904F4E73-6782-4AD8-8521-FEB473BF11CF", "versionEndExcluding": "1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8580E274-19E5-454B-9FA4-F79D6E67C244", "versionEndExcluding": "1.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*", "matchCriteriaId": "1A4B24E4-D317-4D64-8BBC-EF86290F812C", "versionEndExcluding": "1.10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*", "matchCriteriaId": "753A378D-ECC2-4CBD-B142-58F413AF5497", "versionEndExcluding": "1.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B549DC33-2238-4356-8079-A7D18323255E", "versionEndExcluding": "3.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "A2D8B3BE-B451-4596-8FDB-BD43BC2BB923", "versionEndExcluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain." } ], "id": "CVE-2023-28799", "lastModified": "2024-11-21T07:56:02.213", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-22T20:15:09.283", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1287" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-16 20:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cve@zscaler.com | https://trust.zscaler.com/posts/7316 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://trust.zscaler.com/posts/7316 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8DA41D34-ECD0-41CE-B3B8-86CE19F58A32", "versionEndExcluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges." }, { "lang": "es", "value": "Zscaler Client Connector versiones anteriores a 3.1.0, no comprobaba suficientemente los clientes RPC, lo que permite a un adversario local ejecutar c\u00f3digo con privilegios system o llevar a cabo acciones limitadas para las que no ten\u00eda privilegios" } ], "id": "CVE-2020-11635", "lastModified": "2024-11-21T04:58:17.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-16T20:15:15.487", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://trust.zscaler.com/posts/7316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://trust.zscaler.com/posts/7316" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 20:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "CB6BCF1E-94BA-4158-8F8B-C3E5C9A731FC", "versionEndExcluding": "2.1.2.150", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges." }, { "lang": "es", "value": "El Zscaler Client Connector anterior a versi\u00f3n 2.1.2.150, no citaba la ruta de b\u00fasqueda de servicios, lo que permite a un adversario local ejecutar c\u00f3digo con privilegios del sistema" } ], "id": "CVE-2020-11632", "lastModified": "2024-11-21T04:58:17.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-15T20:15:09.207", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
5.9 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9B8D07A9-4498-4AFE-BE03-7241D844ED24", "versionEndExcluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.\n\n" }, { "lang": "es", "value": "Es posible omitir la autenticaci\u00f3n mediante la suplantaci\u00f3n de un dispositivo con una direcci\u00f3n IP sint\u00e9tica en Zscaler Client Connector en Windows, lo que permite omitir la funcionalidad. Este problema afecta a Client Connector: versiones anteriores a 3.9." } ], "id": "CVE-2023-28803", "lastModified": "2024-11-21T07:56:02.757", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.627", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:23
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Summary
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2D2DCA8F-AE47-4F23-A0F0-E72721B13BDE", "versionEndExcluding": "4.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows \u003c4.2.1" }, { "lang": "es", "value": "En ciertos casos, Zscaler Internet Access (ZIA) se puede desactivar mediante comandos de PowerShell con derechos de administrador. Esto afecta a Zscaler Client Connector en Windows \u0026lt;4.2.1" } ], "id": "CVE-2024-23464", "lastModified": "2024-08-07T21:23:59.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:47.643", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2.1" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-22 20:15
Modified
2024-11-21 07:56
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * | |
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "904F4E73-6782-4AD8-8521-FEB473BF11CF", "versionEndExcluding": "1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8580E274-19E5-454B-9FA4-F79D6E67C244", "versionEndExcluding": "1.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*", "matchCriteriaId": "1A4B24E4-D317-4D64-8BBC-EF86290F812C", "versionEndExcluding": "1.10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*", "matchCriteriaId": "753A378D-ECC2-4CBD-B142-58F413AF5497", "versionEndExcluding": "1.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B549DC33-2238-4356-8079-A7D18323255E", "versionEndExcluding": "3.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "A2D8B3BE-B451-4596-8FDB-BD43BC2BB923", "versionEndExcluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login." } ], "id": "CVE-2023-28800", "lastModified": "2024-11-21T07:56:02.353", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-22T20:15:09.373", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" }, { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 20:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7382AEA8-E99F-4E18-BF02-23F826FFD683", "versionEndExcluding": "2.1.2.105", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context." }, { "lang": "es", "value": "El Zscaler Client Connector para Windows anterior a versi\u00f3n 2.1.2.105, presentaba una vulnerabilidad de secuestro DLL causada debido a la configuraci\u00f3n de OpenSSL. Un adversario local puede ser capaz de ejecutar c\u00f3digo arbitrario en el contexto SYSTEM" } ], "id": "CVE-2020-11634", "lastModified": "2024-11-21T04:58:17.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-15T20:15:09.243", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:29
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "260C3474-C82C-4E8A-9C63-FABD53E163BD", "versionEndExcluding": "4.2.0.190", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows \u003c4.2.0.190." }, { "lang": "es", "value": "Una validaci\u00f3n incorrecta de la firma en Zscaler Client Connector en Windows permite a un usuario autenticado desactivar la manipulaci\u00f3n. Este problema afecta a Client Connector en Windows \u0026lt;4.2.0.190." } ], "id": "CVE-2023-28806", "lastModified": "2024-08-07T21:29:17.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:46.453", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:29
Severity ?
6.4 (Medium) - CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "44636F3C-BC75-49FD-9CC4-D451810B0898", "versionEndExcluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS \u003c4.2." }, { "lang": "es", "value": "El proceso Zscaler Updater no valida la firma digital del instalador antes de la ejecuci\u00f3n, lo que permite ejecutar c\u00f3digo arbitrario localmente. Esto afecta a Zscaler Client Connector en MacOS \u0026lt;4.2." } ], "id": "CVE-2024-23460", "lastModified": "2024-08-07T21:29:01.067", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:47.460", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos\u0026applicable_version=4.2" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-06 08:15
Modified
2024-11-21 07:56
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322", "versionEndExcluding": "1.3.1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n" }, { "lang": "es", "value": "La vulnerabilidad de error de validaci\u00f3n de origen en Zscaler Client Connector en Linux permite el abuso de privilegios. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6." } ], "id": "CVE-2023-28794", "lastModified": "2024-11-21T07:56:01.593", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-06T08:15:22.037", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-21 11:15
Modified
2024-11-21 07:56
Severity ?
4.9 (Medium) - CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Summary
An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9296FE9A-8C4B-463E-9AF8-D787280C2D57", "versionEndExcluding": "4.2.0.149", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n incorrecta del valor de verificaci\u00f3n de integridad en Zscaler Client Connector en Windows permite a un usuario autenticado deshabilitar ZIA/ZPA interrumpiendo el reinicio del servicio desde Zscaler Diagnostics. Este problema afecta a Client Connector: anterior a 4.2.0.149." } ], "id": "CVE-2023-28802", "lastModified": "2024-11-21T07:56:02.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 4.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-21T11:15:08.633", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:30
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "260C3474-C82C-4E8A-9C63-FABD53E163BD", "versionEndExcluding": "4.2.0.190", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector \u003c4.2.0.190 with anti-tampering enabled." }, { "lang": "es", "value": "La protecci\u00f3n contra manipulaciones se puede desactivar bajo ciertas condiciones sin validaci\u00f3n de firma. Esto afecta a Zscaler Client Connector \u0026lt;4.2.0.190 con la funci\u00f3n antimanipulaci\u00f3n habilitada." } ], "id": "CVE-2024-23456", "lastModified": "2024-08-07T21:30:09.227", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:47.060", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 05:56
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "87D5E96F-6D38-4787-8E26-589C0EABDFFF", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.\n\n\n" }, { "lang": "es", "value": "Zscaler Client Connector para macOS anterior a 3.6 no validaba suficientemente los clientes RPC. Un adversario local sin privilegios suficientes podr\u00eda cerrar el t\u00fanel Zscaler aprovechando una condici\u00f3n de ejecuci\u00f3n." } ], "id": "CVE-2021-26737", "lastModified": "2024-11-21T05:56:46.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.127", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.6\u0026deployment_date=2022-01-07\u0026id=1388686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.6\u0026deployment_date=2022-01-07\u0026id=1388686" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:29
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "260C3474-C82C-4E8A-9C63-FABD53E163BD", "versionEndExcluding": "4.2.0.190", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows \u003c4.2.0.190." }, { "lang": "es", "value": "Al copiar archivos de registro de actualizaci\u00f3n autom\u00e1tica individuales, faltaba la verificaci\u00f3n del punto de an\u00e1lisis, lo que podr\u00eda dar lugar a ataques elaborados, lo que podr\u00eda provocar una escalada de privilegios locales. Este problema afecta a Zscaler Client Connector en Windows \u0026lt;4.2.0.190." } ], "id": "CVE-2024-23458", "lastModified": "2024-08-07T21:29:09.537", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.5, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:47.260", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322", "versionEndExcluding": "1.3.1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la librer\u00eda signelf utilizada por Zscaler Client Connector en Linux permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6." } ], "id": "CVE-2023-28793", "lastModified": "2024-11-21T07:56:01.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.387", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 05:56
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "42F3A99E-0E82-49F1-88D5-9397220A0A1A", "versionEndExcluding": "3.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.\n\n\n" }, { "lang": "es", "value": "Zscaler Client Connector para macOS anterior a 3.7 ten\u00eda una vulnerabilidad de ruta de b\u00fasqueda sin comillas a trav\u00e9s de la variable PATH. Un adversario local puede ejecutar c\u00f3digo con privilegios de root." } ], "id": "CVE-2021-26738", "lastModified": "2024-11-21T05:56:46.947", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.187", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.7\u0026deployment_date=2022-08-19\u0026id=1414851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.7\u0026deployment_date=2022-08-19\u0026id=1414851" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 18:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "811027D2-BD8F-482D-A425-C58BB48CF986", "versionEndExcluding": "2.1.2.81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges." }, { "lang": "es", "value": "El Zscaler Client Connector para Windows anterior a versi\u00f3n 2.1.2.74, presentaba un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria cuando se conectaba a servidores TLS mal configurados. Un adversario podr\u00eda potencialmente haber podido ejecutar c\u00f3digo arbitrario con privilegios del sistema" } ], "id": "CVE-2020-11633", "lastModified": "2024-11-21T04:58:17.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-15T18:15:08.643", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-07 21:23
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS <4.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", "matchCriteriaId": "44636F3C-BC75-49FD-9CC4-D451810B0898", "versionEndExcluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection.\u00a0This issue affects Zscaler Client Connector on MacOS \u003c4.2." }, { "lang": "es", "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Zscaler Client Connector en MacOS permite la inyecci\u00f3n de comandos del sistema operativo. Este problema afecta a Zscaler Client Connector en MacOS \u0026lt;4.2." } ], "id": "CVE-2024-23483", "lastModified": "2024-08-07T21:23:09.080", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-06T16:15:47.850", "references": [ { "source": "cve@zscaler.com", "tags": [ "Vendor Advisory" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos\u0026applicable_version=4.2" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "265D988F-CAC9-45C0-A663-257BD0DCEF15", "versionEndExcluding": "1.4.0.105", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105" }, { "lang": "es", "value": "Una vulnerabilidad de verificaci\u00f3n incorrecta de Cryptographic Signature en Zscaler Client Connector en Linux permite reemplazar archivos binarios. Este problema afecta a Linux Client Connector: antes de 1.4.0.105" } ], "id": "CVE-2023-28804", "lastModified": "2024-11-21T07:56:02.890", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.687", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 05:56
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3A7E628-F74C-46BC-A5E5-25402F2B90D8", "versionEndExcluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n" }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en Zscaler Client Connector Installer and Uninstaller para Windows anteriores a 3.6 permit\u00edan la ejecuci\u00f3n de archivos binarios desde una ruta con pocos privilegios. Un adversario local puede ejecutar c\u00f3digo con privilegios de SYSTEM." } ], "id": "CVE-2021-26736", "lastModified": "2024-11-21T05:56:46.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.063", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322", "versionEndExcluding": "1.3.1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6." }, { "lang": "es", "value": "La verificaci\u00f3n incorrecta de la vulnerabilidad de Cryptographic Signature en Zscaler Client Connector en Linux permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6." } ], "id": "CVE-2023-28796", "lastModified": "2024-11-21T07:56:01.850", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.507", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "matchCriteriaId": "265D988F-CAC9-45C0-A663-257BD0DCEF15", "versionEndExcluding": "1.4.0.105", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105" }, { "lang": "es", "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Zscaler Client Connector en Linux permite la escalada de privilegios. Este problema afecta a Client Connector: anterior a 1.4.0.105" } ], "id": "CVE-2023-28805", "lastModified": "2024-11-21T07:56:03.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 4.7, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.740", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-23 14:15
Modified
2024-11-21 07:56
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Summary
Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zscaler | client_connector | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "matchCriteriaId": "54B697A3-9F3A-4C87-A8E9-462696DF7BB6", "versionEndExcluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.\n\n\n\n" }, { "lang": "es", "value": "Zscaler Client Connector para Windows anterior a 4.1 escribe/elimina un archivo de configuraci\u00f3n dentro de carpetas espec\u00edficas en el disco. Un usuario malintencionado puede reemplazar la carpeta y ejecutar c\u00f3digo como usuario privilegiado." } ], "id": "CVE-2023-28797", "lastModified": "2024-11-21T07:56:01.970", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.5, "source": "cve@zscaler.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-23T14:15:09.567", "references": [ { "source": "cve@zscaler.com", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022" } ], "sourceIdentifier": "cve@zscaler.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "cve@zscaler.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2024-23458
Vulnerability from cvelistv5
Published
2024-08-06 15:22
Modified
2024-08-06 18:36
Severity ?
EPSS score ?
Summary
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2.0.190 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23458", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T18:35:13.595878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T18:36:26.478Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Equinor Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows \u0026lt;4.2.0.190.\u003cbr\u003e" } ], "value": "While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows \u003c4.2.0.190." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:22:58.963Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "source": { "discovery": "UNKNOWN" }, "title": "Local Privilege Escalation on Zscaler Client Connector on Windows", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2024-23458", "datePublished": "2024-08-06T15:22:58.963Z", "dateReserved": "2024-01-17T15:15:47.221Z", "dateUpdated": "2024-08-06T18:36:26.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23460
Vulnerability from cvelistv5
Published
2024-08-06 15:29
Modified
2024-08-06 20:06
Severity ?
EPSS score ?
Summary
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23460", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T17:57:32.876295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:06:58.896Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "LMCO Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS \u0026lt;4.2.\u003cbr\u003e" } ], "value": "The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS \u003c4.2." } ], "impacts": [ { "capecId": "CAPEC-558", "descriptions": [ { "lang": "en", "value": "CAPEC-558 Replace Trusted Executable" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:29:26.050Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos\u0026applicable_version=4.2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incorrect signature validation of package", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2024-23460", "datePublished": "2024-08-06T15:29:26.050Z", "dateReserved": "2024-01-17T15:15:47.221Z", "dateUpdated": "2024-08-06T20:06:58.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28804
Vulnerability from cvelistv5
Published
2023-10-23 13:33
Modified
2024-10-17 15:09
Severity ?
EPSS score ?
Summary
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.4.0.105 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "1.4.0.105", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-28804", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T14:16:28.392616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T14:30:59.990Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.4.0.105", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Tesla Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105" } ], "value": "An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:09:55.800Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "source": { "discovery": "UNKNOWN" }, "title": "Linux ZCC allows unsigned updates, allowing elevated Code Execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28804", "datePublished": "2023-10-23T13:33:19.903Z", "dateReserved": "2023-03-23T18:29:15.803Z", "dateUpdated": "2024-10-17T15:09:55.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23456
Vulnerability from cvelistv5
Published
2024-08-06 15:21
Modified
2024-08-06 15:44
Severity ?
EPSS score ?
Summary
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2.0.190 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23456", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T15:42:16.128378Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:44:01.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Equinor Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAnti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector \u0026lt;4.2.0.190 with anti-tampering enabled.\u003c/span\u003e" } ], "value": "Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector \u003c4.2.0.190 with anti-tampering enabled." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:21:51.052Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "source": { "discovery": "UNKNOWN" }, "title": "Signature validation issue leads to Anti-Tampering bypass", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2024-23456", "datePublished": "2024-08-06T15:21:51.052Z", "dateReserved": "2024-01-17T15:15:47.221Z", "dateUpdated": "2024-08-06T15:44:01.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26736
Vulnerability from cvelistv5
Published
2023-10-23 13:21
Modified
2024-08-03 20:33
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:33:40.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "LMCO Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.\n\n\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-234", "descriptions": [ { "lang": "en", "value": "CAPEC-234 Hijacking a privileged process" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:21:19.182Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "source": { "discovery": "UNKNOWN" }, "title": "ZApp Installer Privilege Escalation Vulnerabilities", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2021-26736", "datePublished": "2023-10-23T13:21:12.518Z", "dateReserved": "2021-02-05T20:34:27.824Z", "dateUpdated": "2024-08-03T20:33:40.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23483
Vulnerability from cvelistv5
Published
2024-08-06 15:30
Modified
2024-08-06 18:08
Severity ?
EPSS score ?
Summary
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS <4.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unaffected", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23483", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T17:42:35.559952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T18:08:53.764Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Singapore GovTech Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis issue affects Zscaler Client Connector on MacOS \u0026lt;4.2.\u003c/span\u003e" } ], "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection.\u00a0This issue affects Zscaler Client Connector on MacOS \u003c4.2." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:30:51.851Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos\u0026applicable_version=4.2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Local Privilege Escalation via lack of input validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2024-23483", "datePublished": "2024-08-06T15:30:51.851Z", "dateReserved": "2024-01-17T16:32:36.625Z", "dateUpdated": "2024-08-06T18:08:53.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26734
Vulnerability from cvelistv5
Published
2023-10-23 13:18
Modified
2024-09-17 13:46
Severity ?
EPSS score ?
Summary
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.4.0.124 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:33:40.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-26734", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T20:17:30.565473Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T13:46:22.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.4.0.124", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Benjamin Dubost, LMCO" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.\u003cbr\u003e\n\n\u003cbr\u003e\n\n" } ], "value": "Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.\n\n\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:18:36.569Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "source": { "discovery": "UNKNOWN" }, "title": "Junction Delete leading to elevation of privilege", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2021-26734", "datePublished": "2023-10-23T13:18:36.569Z", "dateReserved": "2021-02-05T20:34:27.823Z", "dateUpdated": "2024-09-17T13:46:22.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28796
Vulnerability from cvelistv5
Published
2023-10-23 13:28
Modified
2024-10-17 15:09
Severity ?
EPSS score ?
Summary
Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.3.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.3.1.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Paul Gerste, SonarSource" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\u003cbr\u003e" } ], "value": "Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:09:17.790Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "source": { "discovery": "UNKNOWN" }, "title": "IPC Bypass Through PLT Section in ELF", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28796", "datePublished": "2023-10-23T13:28:15.790Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-10-17T15:09:17.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26737
Vulnerability from cvelistv5
Published
2023-10-23 13:22
Modified
2024-09-11 14:32
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:33:40.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.6\u0026deployment_date=2022-01-07\u0026id=1388686" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-26737", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T14:16:46.100288Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T14:32:14.147Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Thomas Chauchefoin (SonarSource), Dave Satchell (Avast Red Team)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.\n\n\u003cbr\u003e" } ], "value": "The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-26", "descriptions": [ { "lang": "en", "value": "CAPEC-26 Leveraging Race Conditions" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:22:51.537Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.6\u0026deployment_date=2022-01-07\u0026id=1388686" } ], "source": { "discovery": "UNKNOWN" }, "title": "Privilege Escalation Using PID Reuse in ZCC macOS", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2021-26737", "datePublished": "2023-10-23T13:22:51.537Z", "dateReserved": "2021-02-05T20:34:27.824Z", "dateUpdated": "2024-09-11T14:32:14.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11634
Vulnerability from cvelistv5
Published
2021-07-15 19:18
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-15T19:18:48", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@zscaler.com", "ID": "CVE-2020-11634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105", "refsource": "MISC", "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ] } } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2020-11634", "datePublished": "2021-07-15T19:18:48", "dateReserved": "2020-04-08T00:00:00", "dateUpdated": "2024-08-04T11:35:13.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28802
Vulnerability from cvelistv5
Published
2023-11-21 10:51
Modified
2024-12-02 20:51
Severity ?
EPSS score ?
Summary
An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2.0.149 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28802", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-11-30T15:21:18.892711Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T20:51:20.463Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2.0.149", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.\n\n" } ], "value": "An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.\n\n" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-354", "description": "CWE-354 Improper Validation of Integrity Check Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T10:51:50.755Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Disable Zscaler using machine tunnel restart", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28802", "datePublished": "2023-11-21T10:51:50.755Z", "dateReserved": "2023-03-23T18:29:15.803Z", "dateUpdated": "2024-12-02T20:51:20.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28794
Vulnerability from cvelistv5
Published
2023-11-06 07:19
Modified
2024-09-05 13:57
Severity ?
EPSS score ?
Summary
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.3.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28794", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T13:55:48.359530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T13:57:13.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.3.1.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Paul Gerste, SonarSource" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\u003cbr\u003e\n\n" } ], "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122 Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-06T07:19:25.606Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "source": { "discovery": "UNKNOWN" }, "title": "PAC Files Exposed to Internet Websites", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28794", "datePublished": "2023-11-06T07:19:25.606Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-09-05T13:57:13.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28797
Vulnerability from cvelistv5
Published
2023-10-23 13:30
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "R\u00e9mi Orious" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.\n\u003cbr\u003e\n\n" } ], "value": "Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:30:38.191Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022" } ], "source": { "discovery": "UNKNOWN" }, "title": "LPE using arbitrary file delete with Symlinks", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28797", "datePublished": "2023-10-23T13:30:38.191Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-08-02T13:51:38.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3661
Vulnerability from cvelistv5
Published
2024-05-06 18:31
Modified
2024-08-28 19:09
Severity ?
EPSS score ?
Summary
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:00.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7" }, { "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7" }, { "tags": [ "x_transferred" ], "url": "https://tunnelvisionbug.com/" }, { "tags": [ "x_transferred" ], "url": "https://www.leviathansecurity.com/research/tunnelvision" }, { "tags": [ "x_transferred" ], "url": "https://news.ycombinator.com/item?id=40279632" }, { "tags": [ "x_transferred" ], "url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/" }, { "tags": [ "x_transferred" ], "url": "https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/" }, { "tags": [ "x_transferred" ], "url": "https://issuetracker.google.com/issues/263721377" }, { "tags": [ "x_transferred" ], "url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision" }, { "tags": [ "x_transferred" ], "url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability" }, { "tags": [ "x_transferred" ], "url": "https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic" }, { "tags": [ "x_transferred" ], "url": "https://news.ycombinator.com/item?id=40284111" }, { "tags": [ "x_transferred" ], "url": "https://www.agwa.name/blog/post/hardening_openvpn_for_def_con" }, { "tags": [ "x_transferred" ], "url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/" }, { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661" }, { "tags": [ "x_transferred" ], "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009" }, { "tags": [ "x_transferred" ], "url": "https://bst.cisco.com/quickview/bug/CSCwk05814" }, { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-3661" }, { "tags": [ "x_transferred" ], "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170" }, { "tags": [ "x_transferred" ], "url": "https://my.f5.com/manage/s/article/K000139553" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-3661", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-08T04:00:07.962328Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T19:09:06.995Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "DHCP", "vendor": "IETF", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2002-12-31T01:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DHCP can add routes to a client\u2019s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN." } ], "value": "DHCP can add routes to a client\u2019s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-501", "description": "CWE-501 Trust Boundary Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-01T15:04:50.790Z", "orgId": "9119a7d8-5eab-497f-8521-727c672e3725", "shortName": "cisa-cg" }, "references": [ { "url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7" }, { "url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7" }, { "url": "https://tunnelvisionbug.com/" }, { "url": "https://www.leviathansecurity.com/research/tunnelvision" }, { "url": "https://news.ycombinator.com/item?id=40279632" }, { "url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/" }, { "url": "https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/" }, { "url": "https://issuetracker.google.com/issues/263721377" }, { "url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision" }, { "url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability" }, { "url": "https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic" }, { "url": "https://news.ycombinator.com/item?id=40284111" }, { "url": "https://www.agwa.name/blog/post/hardening_openvpn_for_def_con" }, { "url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/" }, { "url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661" }, { "url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009" }, { "url": "https://bst.cisco.com/quickview/bug/CSCwk05814" }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3661" }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170" }, { "url": "https://my.f5.com/manage/s/article/K000139553" } ], "source": { "discovery": "UNKNOWN" }, "title": "DHCP routing options can manipulate interface-based VPN traffic", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9119a7d8-5eab-497f-8521-727c672e3725", "assignerShortName": "cisa-cg", "cveId": "CVE-2024-3661", "datePublished": "2024-05-06T18:31:21.217Z", "dateReserved": "2024-04-11T17:24:22.637Z", "dateUpdated": "2024-08-28T19:09:06.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26738
Vulnerability from cvelistv5
Published
2023-10-23 13:24
Modified
2024-08-03 20:33
Severity ?
EPSS score ?
Summary
Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:33:40.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.7\u0026deployment_date=2022-08-19\u0026id=1414851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Deutsche Bank Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.\n\n\u003cbr\u003e" } ], "value": "Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:24:49.584Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS\u0026applicable_version=3.7\u0026deployment_date=2022-08-19\u0026id=1414851" } ], "source": { "discovery": "UNKNOWN" }, "title": "Privilege Escalation for ZCC macOS via PATH Variable", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2021-26738", "datePublished": "2023-10-23T13:24:49.584Z", "dateReserved": "2021-02-05T20:34:27.824Z", "dateUpdated": "2024-08-03T20:33:40.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28806
Vulnerability from cvelistv5
Published
2024-08-06 15:41
Modified
2024-08-06 17:30
Severity ?
EPSS score ?
Summary
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2.0.190 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-28806", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T17:14:09.944551Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T17:30:31.651Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2.0.190", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Equinor Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows \u0026lt;4.2.0.190.\u003cbr\u003e" } ], "value": "An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows \u003c4.2.0.190." } ], "impacts": [ { "capecId": "CAPEC-207", "descriptions": [ { "lang": "en", "value": "CAPEC-207 Removing Important Client Functionality" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:41:01.883Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows\u0026applicable_version=4.2.0.190" } ], "source": { "discovery": "UNKNOWN" }, "title": "Signature validation error in DLL allows disabling anti-tampering protection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28806", "datePublished": "2024-08-06T15:41:01.883Z", "dateReserved": "2023-03-23T18:29:15.803Z", "dateUpdated": "2024-08-06T17:30:31.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23464
Vulnerability from cvelistv5
Published
2024-08-06 15:24
Modified
2024-08-06 15:41
Severity ?
EPSS score ?
Summary
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 4.2.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "client_connector", "vendor": "zscaler", "versions": [ { "lessThan": "4.2.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T15:38:49.752319Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:41:17.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "4.2.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Randstad N.V. Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows \u0026lt;4.2.1\u003c/span\u003e\u003cbr\u003e" } ], "value": "In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows \u003c4.2.1" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T15:24:03.730Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows\u0026applicable_version=4.2.1" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zscaler bypass with administrative privileges on Windows", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2024-23464", "datePublished": "2024-08-06T15:24:03.730Z", "dateReserved": "2024-01-17T15:15:47.222Z", "dateUpdated": "2024-08-06T15:41:17.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28799
Vulnerability from cvelistv5
Published
2023-06-22 19:06
Modified
2024-12-05 17:43
Severity ?
EPSS score ?
Summary
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.9 Mac, 3.7 Win, 1.9.3 iOS, 1.10.2 Android, 1.10.1 Chrome OS, 1.4 Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28799", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T17:43:49.611608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T17:43:58.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.9 Mac, 3.7 Win, 1.9.3 iOS, 1.10.2 Android, 1.10.1 Chrome OS, 1.4 Linux", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Tesla Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.\u0026nbsp;" } ], "value": "A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "CWE-1287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:12:51.479Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28799", "datePublished": "2023-06-22T19:06:24.943Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-12-05T17:43:58.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28805
Vulnerability from cvelistv5
Published
2023-10-23 13:33
Modified
2024-10-17 15:15
Severity ?
EPSS score ?
Summary
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.4.0.105 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.4.0.105", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Tesla Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105" } ], "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:15:44.693Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "source": { "discovery": "UNKNOWN" }, "title": "ZCC on Linux privilege escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28805", "datePublished": "2023-10-23T13:33:57.278Z", "dateReserved": "2023-03-23T18:29:15.803Z", "dateUpdated": "2024-10-17T15:15:44.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28803
Vulnerability from cvelistv5
Published
2023-10-23 13:32
Modified
2024-09-11 14:31
Severity ?
EPSS score ?
Summary
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28803", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T14:16:35.952637Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T14:31:41.067Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Regions Bank Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.\n\n" } ], "value": "An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.\n\n" } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:32:17.505Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023" } ], "source": { "discovery": "UNKNOWN" }, "title": "Traffic being bypassed by ZCC by configuring synthetic IP range as local network", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28803", "datePublished": "2023-10-23T13:32:17.505Z", "dateReserved": "2023-03-23T18:29:15.803Z", "dateUpdated": "2024-09-11T14:31:41.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11635
Vulnerability from cvelistv5
Published
2021-02-16 19:37
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
References
▼ | URL | Tags |
---|---|---|
https://trust.zscaler.com/posts/7316 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Zscaler Client Connector for Windows |
Version: < 3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://trust.zscaler.com/posts/7316" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zscaler Client Connector for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "\u003c 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-16T19:37:39", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://trust.zscaler.com/posts/7316" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@zscaler.com", "ID": "CVE-2020-11635", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zscaler Client Connector for Windows", "version": { "version_data": [ { "version_value": "\u003c 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://trust.zscaler.com/posts/7316", "refsource": "MISC", "url": "https://trust.zscaler.com/posts/7316" } ] } } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2020-11635", "datePublished": "2021-02-16T19:37:39", "dateReserved": "2020-04-08T00:00:00", "dateUpdated": "2024-08-04T11:35:13.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28793
Vulnerability from cvelistv5
Published
2023-10-23 13:26
Modified
2024-10-17 15:08
Severity ?
EPSS score ?
Summary
Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.3.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.3.1.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Paul Gerste \u0026 Thomas Chauchefoin, SonarSource" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\u003cbr\u003e" } ], "value": "Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:08:37.353Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "source": { "discovery": "UNKNOWN" }, "title": "Heap Based Buffer Overflow in Library", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28793", "datePublished": "2023-10-23T13:26:08.391Z", "dateReserved": "2023-03-23T18:29:15.801Z", "dateUpdated": "2024-10-17T15:08:37.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28795
Vulnerability from cvelistv5
Published
2023-10-23 13:27
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 1.3.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "1.3.1.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Paul Gerste, SonarSource" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\u003cbr\u003e\n\n" } ], "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-640", "descriptions": [ { "lang": "en", "value": "CAPEC-640 Inclusion of Code in Existing Process" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:27:24.262Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.3.1\u0026deployment_date=2022-09-19" } ], "source": { "discovery": "UNKNOWN" }, "title": "Client IPC validation bypass", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28795", "datePublished": "2023-10-23T13:27:24.262Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-08-02T13:51:38.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11633
Vulnerability from cvelistv5
Published
2021-07-15 17:01
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-15T17:01:12", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@zscaler.com", "ID": "CVE-2020-11633", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81", "refsource": "MISC", "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.81" } ] } } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2020-11633", "datePublished": "2021-07-15T17:01:13", "dateReserved": "2020-04-08T00:00:00", "dateUpdated": "2024-08-04T11:35:13.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26735
Vulnerability from cvelistv5
Published
2023-10-23 13:19
Modified
2024-08-03 20:33
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:33:40.708Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "LMCO Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.\u003cbr\u003e\n\n\u003cbr\u003e\n\n" } ], "value": "The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T13:19:35.867Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021" } ], "source": { "discovery": "UNKNOWN" }, "title": "Untrusted Search Path While Executing REG DELETE by Uninstaller", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2021-26735", "datePublished": "2023-10-23T13:19:35.867Z", "dateReserved": "2021-02-05T20:34:27.823Z", "dateUpdated": "2024-08-03T20:33:40.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11632
Vulnerability from cvelistv5
Published
2021-07-15 19:18
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-15T19:18:43", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@zscaler.com", "ID": "CVE-2020-11632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105", "refsource": "MISC", "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2020?applicable_category=Windows\u0026applicable_version=2.1.2.105" } ] } } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2020-11632", "datePublished": "2021-07-15T19:18:43", "dateReserved": "2020-04-08T00:00:00", "dateUpdated": "2024-08-04T11:35:13.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28800
Vulnerability from cvelistv5
Published
2023-06-22 19:15
Modified
2024-12-06 15:13
Severity ?
EPSS score ?
Summary
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zscaler | Client Connector |
Version: 0 < 3.9 Mac, 3.7 Win, 1.9.3 iOS, 1.10.2 Android, 1.10.1 Chrome OS, 1.4 Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "tags": [ "x_transferred" ], "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28800", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-06T15:13:27.564632Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-06T15:13:35.280Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Client Connector", "vendor": "Zscaler", "versions": [ { "lessThan": "3.9 Mac, 3.7 Win, 1.9.3 iOS, 1.10.2 Android, 1.10.1 Chrome OS, 1.4 Linux", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Tesla Red Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login." } ], "value": "When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T15:15:03.224Z", "orgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "shortName": "Zscaler" }, "references": [ { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows\u0026applicable_version=3.7\u0026deployment_date=2021-11-26\u0026id=1386541" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS\u0026applicable_version=1.10.1\u0026deployment_date=2023-03-10\u0026id=1447771" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android\u0026applicable_version=1.10.2\u0026deployment_date=2023-03-09\u0026id=1447706" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS\u0026applicable_version=1.9.3\u0026deployment_date=2023-03-03\u0026id=1447071" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux\u0026applicable_version=1.4\u0026deployment_date=2022-10-31\u0026id=1420246" }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS\u0026applicable_version=3.9\u0026deployment_date=2023-01-25\u0026id=1443546" } ], "source": { "discovery": "UNKNOWN" }, "title": "Output encoding missing in redrurl parameter", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "73c6f63b-efac-410d-a0a9-569700f85a04", "assignerShortName": "Zscaler", "cveId": "CVE-2023-28800", "datePublished": "2023-06-22T19:15:55.258Z", "dateReserved": "2023-03-23T18:29:15.802Z", "dateUpdated": "2024-12-06T15:13:35.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }