Lucene search

K
cvelistZscalerCVELIST:CVE-2023-28803
HistoryOct 23, 2023 - 1:32 p.m.

CVE-2023-28803 Traffic being bypassed by ZCC by configuring synthetic IP range as local network

2023-10-2313:32:17
CWE-290
Zscaler
www.cve.org
cve-2023-28803
authentication bypass
traffic bypass
zscaler client connector
windows
ip address spoofing
functionality bypass

5.9 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

0.0004 Low

EPSS

Percentile

10.6%

An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Client Connector",
    "vendor": "Zscaler",
    "versions": [
      {
        "lessThan": "3.9",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

0.0004 Low

EPSS

Percentile

10.6%

Related for CVELIST:CVE-2023-28803