Skip to content

Commit

Permalink
20240501002-Zscaler-Client-Connector-Vulnerability (#691)
Browse files Browse the repository at this point in the history
* 20240501002-Zscaler-Client-Connector-Vulnerability

* Format markdown docs

---------

Co-authored-by: carel-v98 <carel-v98@users.noreply.github.com>
Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
  • Loading branch information
3 people authored May 1, 2024
1 parent a2f04d3 commit 8c60761
Showing 1 changed file with 21 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Zscaler Client Connector Vulnerability - 20240501002

## Overview

Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1

## What is vulnerable?

| CVE | Severity | CVSS | Product(s) Affected |
| --------------------------------------------------------------------- | -------- | ---- | ------------------------- |
| [**CVE-2024-23463**](https://nvd.nist.gov/vuln/detail/CVE-2024-23463) | **High** | 8.8 | **versions before 4.2.1** |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)):

- [Zscaler Client Connector 4.3.0.151 Enhancements and Fixes](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023)

0 comments on commit 8c60761

Please sign in to comment.