Lucene search

K
ZscalerClient Connector

27 matches found

CVE
CVE
added 2024/05/06 7:15 p.m.271 views

CVE-2024-3661

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify ne...

7.6CVSS7.3AI score0.02136EPSS
CVE
CVE
added 2023/11/21 11:15 a.m.52 views

CVE-2023-28802

An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.

5.4CVSS5.2AI score0.00088EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.50 views

CVE-2021-26736

Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.

7.8CVSS7.2AI score0.00033EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.50 views

CVE-2023-28797

Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.

7.3CVSS6.8AI score0.00032EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.47 views

CVE-2020-11634

The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.

7.8CVSS7.7AI score0.00064EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.44 views

CVE-2021-26738

Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.

7.8CVSS7.6AI score0.00038EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.42 views

CVE-2020-11632

The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.

7.8CVSS7.7AI score0.00072EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.42 views

CVE-2024-23464

In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows

7.2CVSS7.4AI score0.00133EPSS
CVE
CVE
added 2021/02/16 8:15 p.m.38 views

CVE-2020-11635

The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.

7.8CVSS7.7AI score0.00116EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.36 views

CVE-2023-28793

Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

7.8CVSS7.9AI score0.00042EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.36 views

CVE-2023-28795

Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

7.8CVSS7.7AI score0.00026EPSS
CVE
CVE
added 2021/07/15 6:15 p.m.33 views

CVE-2020-11633

The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.

10CVSS9.9AI score0.01073EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.33 views

CVE-2021-26735

The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.

7.8CVSS7.1AI score0.00039EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.32 views

CVE-2023-28805

An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105

9.8CVSS8.1AI score0.00076EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.31 views

CVE-2023-28803

An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.

6.5CVSS6.2AI score0.00007EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.31 views

CVE-2023-28804

An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105

8.2CVSS6.2AI score0.0003EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.30 views

CVE-2021-26734

Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.

5.5CVSS4.8AI score0.00023EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.29 views

CVE-2023-28796

Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

7.8CVSS7.3AI score0.00012EPSS
CVE
CVE
added 2023/06/22 8:15 p.m.29 views

CVE-2023-28799

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.

8.2CVSS6.7AI score0.00111EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.28 views

CVE-2024-23483

An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS

9.8CVSS7.3AI score0.00306EPSS
CVE
CVE
added 2023/11/06 8:15 a.m.27 views

CVE-2023-28794

Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

6.5CVSS5.1AI score0.00068EPSS
CVE
CVE
added 2023/10/23 2:15 p.m.26 views

CVE-2021-26737

The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.

5.5CVSS4.7AI score0.00019EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.26 views

CVE-2024-23458

While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows

7.8CVSS7AI score0.00017EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.24 views

CVE-2024-23456

Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector

7.8CVSS7.2AI score0.00145EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.22 views

CVE-2024-23460

The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS

7.8CVSS7.6AI score0.00013EPSS
CVE
CVE
added 2024/08/06 4:15 p.m.20 views

CVE-2023-28806

An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows

6.5CVSS7AI score0.00035EPSS
CVE
CVE
added 2023/06/22 8:15 p.m.19 views

CVE-2023-28800

When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.

8.1CVSS6.5AI score0.00158EPSS