Lucene search

K
cvelistZscalerCVELIST:CVE-2023-28807
HistoryJan 31, 2024 - 7:16 p.m.

CVE-2023-28807 Bypass of ZIA domain fronting detection module through evasion technique

2024-01-3119:16:59
CWE-295
Zscaler
www.cve.org
cve-2023-28807
bypass
zscaler internet access
evasion technique
network security controls
sni
attackers
legitimate traffic

5.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

18.0%

In Zscaler Internet Access (ZIA) a mismatch between Connect Host and Client Hello’s Server Name Indication (SNI) enables attackers to evade network security controls by hiding their communications within legitimate traffic.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ZIA",
    "vendor": "Zscaler",
    "versions": [
      {
        "lessThan": "6.2r.290",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

5.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

18.0%

Related for CVELIST:CVE-2023-28807