CVE-2024-23458

Aug. 6, 2024, 4:30 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

Zscaler Client Connector

  • before 4.2.0.190

Source

cve@zscaler.com

Tags

CVE-2024-23458 details

Published : Aug. 6, 2024, 4:15 p.m.
Last Modified : Aug. 6, 2024, 4:30 p.m.

Description

While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.

CVSS Score

1 2 3 4 5 6 7.3 8 9 10

Weakness

Weakness Name Description
CWE-346 Origin Validation Error The product does not properly verify that the source of data or communication is valid.

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

Base Score

7.3

Exploitability Score

1.8

Impact Score

5.5

Base Severity

HIGH

This website uses the NVD API, but is not approved or certified by it.