Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
Zscaler Client Connector
- before 4.2.0.190
Source
cve@zscaler.com
Tags
CVE-2024-23458 details
Published : Aug. 6, 2024, 4:15 p.m.
Last Modified : Aug. 6, 2024, 4:30 p.m.
Last Modified : Aug. 6, 2024, 4:30 p.m.
Description
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.3 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-346 | Origin Validation Error | The product does not properly verify that the source of data or communication is valid. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
Base Score
7.3
Exploitability Score
1.8
Impact Score
5.5
Base Severity
HIGH
Vector String : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
References
URL | Source |
---|---|
https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=windows&applicable_version=4.2.0.190 | cve@zscaler.com |
This website uses the NVD API, but is not approved or certified by it.