Vulnerabilities (CVE)

Filtered by vendor Zscaler Subscribe
Filtered by product Client Connector
Total 27 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-3661 9 Apple, Cisco, Citrix and 6 more 12 Iphone Os, Macos, Anyconnect Vpn Client and 9 more 2025-01-15 N/A 7.6 HIGH
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
CVE-2023-28805 1 Zscaler 1 Client Connector 2024-10-17 N/A 9.8 CRITICAL
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105
CVE-2023-28800 1 Zscaler 1 Client Connector 2024-10-17 N/A 6.1 MEDIUM
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
CVE-2023-28796 1 Zscaler 1 Client Connector 2024-10-17 N/A 7.8 HIGH
Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CVE-2023-28799 1 Zscaler 1 Client Connector 2024-10-17 N/A 6.1 MEDIUM
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
CVE-2023-28793 1 Zscaler 1 Client Connector 2024-10-17 N/A 7.8 HIGH
Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CVE-2024-23456 1 Zscaler 1 Client Connector 2024-08-07 N/A 7.5 HIGH
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
CVE-2024-23460 1 Zscaler 1 Client Connector 2024-08-07 N/A 7.8 HIGH
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
CVE-2024-23458 1 Zscaler 1 Client Connector 2024-08-07 N/A 7.8 HIGH
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
CVE-2023-28806 1 Zscaler 1 Client Connector 2024-08-07 N/A 6.5 MEDIUM
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
CVE-2024-23483 1 Zscaler 1 Client Connector 2024-08-07 N/A 9.8 CRITICAL
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS <4.2.
CVE-2024-23464 1 Zscaler 1 Client Connector 2024-08-07 N/A 4.9 MEDIUM
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1
CVE-2023-28802 1 Zscaler 1 Client Connector 2023-11-29 N/A 5.4 MEDIUM
An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.
CVE-2023-28794 1 Zscaler 1 Client Connector 2023-11-14 N/A 6.5 MEDIUM
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CVE-2023-28803 1 Zscaler 1 Client Connector 2023-10-27 N/A 6.5 MEDIUM
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
CVE-2023-28804 1 Zscaler 1 Client Connector 2023-10-27 N/A 5.3 MEDIUM
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
CVE-2023-28795 1 Zscaler 1 Client Connector 2023-10-27 N/A 7.8 HIGH
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CVE-2023-28797 1 Zscaler 1 Client Connector 2023-10-27 N/A 7.3 HIGH
Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.
CVE-2021-26736 1 Zscaler 1 Client Connector 2023-10-27 N/A 7.8 HIGH
Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
CVE-2021-26738 1 Zscaler 1 Client Connector 2023-10-27 N/A 7.8 HIGH
Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.