Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
References
| Link | Resource |
|---|---|
| https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021 | Release Notes |
Configurations
History
27 Oct 2023, 00:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021 - Release Notes | |
| CPE | cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:* | |
| CWE | CWE-22 | |
| First Time |
Zscaler
Zscaler client Connector |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
23 Oct 2023, 14:27
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-10-23 14:15
Updated : 2023-10-27 00:33
NVD link : CVE-2021-26736
Mitre link : CVE-2021-26736
JSON object : View
Products Affected
zscaler
- client_connector
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
