CVE-2024-23463

High
|8.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can bypass the security measures of the Zscaler Client Connector on Windows, allowing them to tamper with the application, but this can only happen if the "Repair App" feature is used. This vulnerability affects versions prior to 4.2.1, so it's crucial to update to the latest version to protect against this risk.

Technical Description

Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References